The easy-fancybox plugin before 1.8.18 for WordPress (aka Easy FancyBox) is susceptible to Stored XSS in the Settings Menu inc/class-easyfancybox.php due to improper encoding of arbitrarily submitted settings parameters. This occurs because there is no inline styles output filter.
References
Link | Resource |
---|---|
https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190911-01_Easy_FancyBox_WP_Plugin_Stored_XSS | Exploit Third Party Advisory |
https://wordpress.org/plugins/easy-fancybox/#developers | Product Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9891 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-09-26 16:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-16524
Mitre link : CVE-2019-16524
CVE.ORG link : CVE-2019-16524
JSON object : View
Products Affected
status301
- easy_fancybox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')