{"vulnerability": "CVE-2021-24450", "sightings": [{"uuid": "8f0a9319-9c7c-4184-8cf2-ebc0c6540408", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24450", "type": "seen", "source": "https://t.me/cibsecurity/26657", "content": "\u203c CVE-2021-24450 \u203c\n\nThe User Registration, User Profiles, Login &amp; Membership \u00c3\u00a2\u00e2\u201a\u00ac\u00e2\u20ac\u0153 ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.8 did not sanitise or escape some of its settings before saving them and outputting them back in the page, allowing high privilege users such as admin to set JavaScript payloads in them even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-02T14:27:24.000000Z"}]}