Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-24150— Like Button Rating < 2.6.32 - Unauthenticated Full-Read SSRF

EPSS 46.26% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-24150

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Like Button Rating < 2.6.32 - Unauthenticated Full-Read SSRF
Source: NVD (National Vulnerability Database)
Vulnerability Description
The LikeBtn WordPress Like Button Rating ♥ LikeBtn WordPress plugin before 2.6.32 was vulnerable to Unauthenticated Full-Read Server-Side Request Forgery (SSRF).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress Like Button Rating 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress Like Button Rating是WordPress开源的一个应用软件。完全自定义的“酷”按钮添加“喜欢”按钮。 WordPress Like Button Rating 2.6.32 存在安全漏洞,该漏洞源于容易受到未经身份验证的完整读服务器端请求伪造(SSRF)的攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
UnknownLike Button Rating ♥ LikeBtn 2.6.32 ~ 2.6.32 -

II. Public POCs for CVE-2021-24150

#POC DescriptionSource LinkShenlong Link
1WordPress Like Button Rating plugin before 2.6.32 is susceptible to server-side request forgery. An attacker can obtain sensitive information, modify data, and/or execute unauthorized operations. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-24150.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-24150

登录查看更多情报信息。

Same Patch Batch · Unknown · 2021-04-05 · 45 CVEs total

CVE-2021-24163Ninja Forms < 3.4.34 - Authenticated SendWP Plugin Installation and Client Secret Key Disc
CVE-2021-24166Ninja Forms < 3.4.34 - CSRF to OAuth Service Disconnection
CVE-2021-24165Ninja Forms < 3.4.34 - Administrator Open Redirect
CVE-2021-24167Web-Stat < 1.4.1 - API Key Disclosure
CVE-2021-24154Theme Editor < 2.6 - Authenticated Arbitrary File Download
CVE-2021-24155Backup Guard < 1.6.0 - Authenticated Arbitrary File Upload
CVE-2021-24156Testimonial Rotator <= 3.0.3 - Authenticated Stored Cross-Site Scripting
CVE-2021-24157Orbit Fox by ThemeIsle < 2.10.3 - Authenticated Stored Cross Site Scripting
CVE-2021-24158Orbit Fox by ThemeIsle < 2.10.3 - Authenticated Privilege Escalation
CVE-2021-24153Yoast SEO < 3.4.1 - Authenticated Stored Cross-Site Scripting (XSS)
CVE-2021-24164Ninja Forms < 3.4.34.1 - Authenticated OAuth Connection Key Disclosure
CVE-2021-24159Contact Form 7 Style <= 3.1.9 - Cross-Site Request Forgery to Stored Cross-Site Scripting
CVE-2021-24176JH 404 Logger <= 1.1 - Unauthenticated Stored Cross-Site Scripting (XSS)
CVE-2021-24175The Plus Addons for Elementor Page Builder < 4.1.7 - Authentication Bypass
CVE-2021-24174Database Backups <= 1.2.2.6 - CSRF to Backup Download
CVE-2021-24173VM Backups <= 1.0 - CSRF to Stored Cross-Site Scripting (XSS)
CVE-2021-24172VM Backups <= 1.0 - CSRF to Database Backup Download
CVE-2021-24171WooCommerce Upload Files < 59.4 - Unauthenticated Arbitrary File Upload
CVE-2021-24170User Profile Picture < 2.5.0 - Sensitive Information Disclosure
CVE-2021-24169Advanced Order Export For WooCommerce < 3.1.8 - Reflected Cross-Site Scripting (XSS)

Showing top 20 of 45 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2021-24150

No comments yet


Leave a comment