ID

VAR-202205-0286


CVE

CVE-2021-25102


TITLE

All In One WP Security & Firewall WordPress  Cross-site scripting vulnerability in plugins

Trust: 0.8

sources: JVNDB: JVNDB-2022-010251

DESCRIPTION

The All In One WP Security & Firewall WordPress plugin before 4.4.11 does not validate, sanitise and escape the redirect_to parameter before using it to redirect user, either via a Location header, or meta url attribute, when the Rename Login Page is active, which could lead to an Arbitrary Redirect as well as Cross-Site Scripting issue. Exploitation of this issue requires the Login Page URL value to be known, which should be hard to guess, reducing the risk. All In One WP Security & Firewall WordPress A cross-site scripting vulnerability exists in the plugin.Information may be obtained and information may be tampered with. Both WordPress and WordPress plugins are products of the WordPress Foundation. WordPress is a blogging platform developed using PHP language. The platform supports setting up personal blog sites on PHP and MySQL servers. A WordPress plugin is an application plugin. The redirect_to parameter is defined, an attacker can exploit this vulnerability to execute JavaScript code on the client

Trust: 1.8

sources: NVD: CVE-2021-25102 // JVNDB: JVNDB-2022-010251 // VULHUB: VHN-383823 // VULMON: CVE-2021-25102

AFFECTED PRODUCTS

vendor:tipsandtricks hqmodel:all in one wp security \& firewallscope:ltversion:4.4.11

Trust: 1.0

vendor:tips and tricks hqmodel:all in one wp security & firewallscope:eqversion: -

Trust: 0.8

vendor:tips and tricks hqmodel:all in one wp security & firewallscope:eqversion:4.4.11

Trust: 0.8

sources: JVNDB: JVNDB-2022-010251 // NVD: CVE-2021-25102

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-25102
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-25102
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202205-1900
value: MEDIUM

Trust: 0.6

VULHUB: VHN-383823
value: LOW

Trust: 0.1

VULMON: CVE-2021-25102
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-25102
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-383823
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-25102
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: CVE-2021-25102
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-383823 // VULMON: CVE-2021-25102 // JVNDB: JVNDB-2022-010251 // CNNVD: CNNVD-202205-1900 // NVD: CVE-2021-25102

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.1

problemtype:Cross-site scripting (CWE-79) [ others ]

Trust: 0.8

sources: VULHUB: VHN-383823 // JVNDB: JVNDB-2022-010251 // NVD: CVE-2021-25102

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202205-1900

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202205-1900

PATCH

title:All-In-One Security (AIOS) - Security and Firewallurl:https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/

Trust: 0.8

title:WordPress plugin All In One WP Security & Firewall Fixes for cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=191234

Trust: 0.6

sources: JVNDB: JVNDB-2022-010251 // CNNVD: CNNVD-202205-1900

EXTERNAL IDS

db:NVDid:CVE-2021-25102

Trust: 3.4

db:JVNDBid:JVNDB-2022-010251

Trust: 0.8

db:CNNVDid:CNNVD-202205-1900

Trust: 0.6

db:CNVDid:CNVD-2022-59805

Trust: 0.1

db:VULHUBid:VHN-383823

Trust: 0.1

db:VULMONid:CVE-2021-25102

Trust: 0.1

sources: VULHUB: VHN-383823 // VULMON: CVE-2021-25102 // JVNDB: JVNDB-2022-010251 // CNNVD: CNNVD-202205-1900 // NVD: CVE-2021-25102

REFERENCES

url:https://wpscan.com/vulnerability/9b8a00a6-622b-4309-bbbf-fe2c7fc9f8b6

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-25102

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2021-25102/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-383823 // VULMON: CVE-2021-25102 // JVNDB: JVNDB-2022-010251 // CNNVD: CNNVD-202205-1900 // NVD: CVE-2021-25102

SOURCES

db:VULHUBid:VHN-383823
db:VULMONid:CVE-2021-25102
db:JVNDBid:JVNDB-2022-010251
db:CNNVDid:CNNVD-202205-1900
db:NVDid:CVE-2021-25102

LAST UPDATE DATE

2024-08-14T15:42:25.989000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-383823date:2022-05-10T00:00:00
db:VULMONid:CVE-2021-25102date:2022-05-10T00:00:00
db:JVNDBid:JVNDB-2022-010251date:2023-08-14T06:05:00
db:CNNVDid:CNNVD-202205-1900date:2022-05-11T00:00:00
db:NVDid:CVE-2021-25102date:2022-05-10T13:14:58.547

SOURCES RELEASE DATE

db:VULHUBid:VHN-383823date:2022-05-02T00:00:00
db:VULMONid:CVE-2021-25102date:2022-05-02T00:00:00
db:JVNDBid:JVNDB-2022-010251date:2023-08-14T00:00:00
db:CNNVDid:CNNVD-202205-1900date:2022-05-02T00:00:00
db:NVDid:CVE-2021-25102date:2022-05-02T16:15:08.093