id: CVE-2021-24214 info: name: WordPress OpenID Connect Generic Client 3.8.0-3.8.1 - Cross-Site Scripting author: tess severity: medium description: WordPress OpenID Connect Generic Client plugin 3.8.0 and 3.8.1 contains a cross-site scripting vulnerability. It does not sanitize the login error when output back in the login form, thereby not requiring authentication, which can be exploited with the default configuration. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the WordPress OpenID Connect Generic Client plugin (3.8.2) to fix this vulnerability. reference: - https://wpscan.com/vulnerability/31cf0dfb-4025-4898-a5f4-fc7115565a10 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24214 - https://nvd.nist.gov/vuln/detail/CVE-2021-24214 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-24214 cwe-id: CWE-79 epss-score: 0.00317 epss-percentile: 0.67073 cpe: cpe:2.3:a:daggerhartlab:openid_connect_generic_client:3.8.0:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: daggerhartlab product: openid_connect_generic_client framework: wordpress tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,wp,openid,daggerhartlab http: - method: GET path: - '{{BaseURL}}/wp-login.php?login-error=' matchers-condition: and matchers: - type: word part: body words: - 'ERROR ():' - 'Login with OpenID Connect' condition: and - type: word part: header words: - text/html - type: status status: - 200 # digest: 4b0a00483046022100d258db47eb6a8af9360ee82439082b93836c9d08a87ce318f2b414d391650dbc022100838c6317f5c624cae5cd969d468ae6d2f000e76ba701279972451bcfa4982948:922c64590222798bb761d5b6d8e72950