Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-24804— Simple JWT Login < 3.2.1 - Arbitrary Settings Update to Site Takeover via CSRF

EPSS 0.11% · P29
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-24804

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Simple JWT Login < 3.2.1 - Arbitrary Settings Update to Site Takeover via CSRF
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Simple JWT Login WordPress plugin before 3.2.1 does not have nonce checks when saving its settings, allowing attackers to make a logged in admin changed them. Settings such as HMAC verification secret, account registering and default user roles can be updated, which could result in site takeover.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨站请求伪造(CSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress 跨站请求伪造漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress是WordPress(Wordpress)基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress plugin Simple JWT Login 3.2.1之前版本存在跨站请求伪造漏洞,攻击者可以更新HMAC验证密钥、帐户注册和默认用户角色等设置。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
UnknownSimple JWT Login – Login and Register to WordPress using JWT 3.2.1 ~ 3.2.1 -

II. Public POCs for CVE-2021-24804

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-24804

登录查看更多情报信息。

Same Patch Batch · Unknown · 2021-11-17 · 19 CVEs total

CVE-2021-24833YOP Poll < 6.3.1 - Author+ Stored Cross-Site Scripting via Preview Module
CVE-2021-24598Testimonial Builder < 1.6.0 - Admin+ Stored Cross-Site Scripting
CVE-2021-24758Email Log < 2.4.7 - Admin+ SQL Injection
CVE-2021-24772Stream < 3.8.2 - Admin+ SQL Injection
CVE-2021-24776WP Performance Score Booster < 2.1 - Settings Change via CSRF
CVE-2021-24787Client Invoicing by Sprout Invoices < 19.9.7 - Admin+ Stored Cross-Site Scripting
CVE-2021-24796My Tickets < 1.8.31 - Unauthenticated Stored Cross-Site Scripting
CVE-2021-24802Colorful Categories < 2.0.15 - Arbitrary Colors Update via CSRF
CVE-2021-24815Paypal Donation < 1.3.2 - Admin+ Stored Cross-Site Scripting
CVE-2021-24856Shared Files < 1.6.61 - Admin+ Stored Cross-Site Scripting
CVE-2021-24834YOP Poll < 6.3.1 - Author+ Stored Cross-Site Scripting via Options Module
CVE-2021-24841Helpful < 4.4.59 - Admin+ Stored Cross-Site Scripting
CVE-2021-24847SEO Redirection < 8.2 - Subscriber+ SQL Injection
CVE-2021-24850Insert Pages < 3.7.0 - Contributor+ Stored Cross-Site Scripting
CVE-2021-24851Insert Pages < 3.7.0 - Contributor+ Arbitrary Posts/Pages Access
CVE-2021-24852MouseWheel Smooth Scroll < 5.7 - Plugin's Setting Update via CSRF
CVE-2021-24853QR Redirector < 1.6 - Subscriber+ Arbitrary QR Redirect Response Status Update
CVE-2021-24854QR Redirector < 1.6.1 - Contributor+ Stored Cross-Site Scripting

IV. Related Vulnerabilities

V. Comments for CVE-2021-24804

No comments yet


Leave a comment