Vulnerability Details : CVE-2021-24371
Potential exploit
The Import feature of the RSVPMaker WordPress plugin before 8.7.3 (/wp-admin/tools.php?page=rsvpmaker_export_screen) takes an URL input and calls curl on it, without first validating it to ensure it's a remote one. As a result, a high privilege user could use that feature to scan the internal network via a SSRF attack.
Vulnerability category: Server-side request forgery (SSRF)
Products affected by CVE-2021-24371
- cpe:2.3:a:carrcommunications:rsvpmaker:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-24371
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-24371
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
2.7
|
LOW | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
1.2
|
1.4
|
NIST |
CWE ids for CVE-2021-24371
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by: contact@wpscan.com (Primary)
References for CVE-2021-24371
-
https://wpscan.com/vulnerability/63be225c-ebee-4cac-b43e-cf033ee7425d
Attention Required! | CloudflareExploit;Third Party Advisory
-
https://codevigilant.com/disclosure/2021/wp-plugin-rsvpmaker/
wp-plugin : rsvpmaker | Code Vigilant : to err is human.. To fix is HumanityExploit;Patch;Third Party Advisory
Jump to