Multiple cross-site scripting (XSS) vulnerabilities in the Activity Log plugin before 2.4.1 for WordPress allow remote attackers to inject arbitrary JavaScript or HTML via a title that is not escaped.
References
Link | Resource |
---|---|
https://github.com/pojome/activity-log/commit/950c46b2290c991187ff3471640e9688b16908fb | Patch Third Party Advisory |
https://github.com/pojome/activity-log/commit/e7bcd12fcb0add82bed762a971f427a360664bd9 | Third Party Advisory Patch Release Notes |
https://plugins.trac.wordpress.org/changeset/1836276 | Patch Third Party Advisory |
https://wordpress.org/plugins/aryo-activity-log/#developers | Release Notes Third Party Advisory |
https://www.exploit-db.com/exploits/44437/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
26 Dec 2023, 19:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pojo:activity_log:*:*:*:*:*:wordpress:*:* | |
First Time |
Pojo activity Log
Pojo |
Information
Published : 2018-03-15 17:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-8729
Mitre link : CVE-2018-8729
CVE.ORG link : CVE-2018-8729
JSON object : View
Products Affected
pojo
- activity_log
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')