Vulnerability Details : CVE-2021-33347
Potential exploit
An issue was discovered in JPress v3.3.0 and below. There are XSS vulnerabilities in the template module and tag management module. If you log in to the background by means of weak password, the storage XSS vulnerability can occur.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2021-33347
- cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-33347
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-33347
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST |
CWE ids for CVE-2021-33347
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-33347
-
https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847
There is a storage XSS vulnerability in the template module · Issue #152 · JPressProjects/jpress · GitHubExploit;Issue Tracking;Third Party Advisory
-
https://github.com/JPressProjects/jpress/issues/152
There is a storage XSS vulnerability in the template module · Issue #152 · JPressProjects/jpress · GitHubExploit;Issue Tracking;Third Party Advisory
Jump to