diff --git a/cves/2021/CVE-2021-24165.yaml b/cves/2021/CVE-2021-24165.yaml index 18143a6626..dd9b694afa 100644 --- a/cves/2021/CVE-2021-24165.yaml +++ b/cves/2021/CVE-2021-24165.yaml @@ -3,10 +3,12 @@ id: CVE-2021-24165 info: name: Ninja Forms < 3.4.34 - Administrator Open Redirect author: dhiyaneshDk,daffainfo - severity: low - description: The wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place. + severity: medium + description: | + The wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place. reference: - https://wpscan.com/vulnerability/6147acf5-e43f-47e6-ab56-c9c8be584818 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24165 tags: wordpress,redirect,wp-plugin,ninjaform,authenticated,wp requests: