The Widget Settings Importer/Exporter Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the wp_ajax_import_widget_dataparameter AJAX action in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with subscriber-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link | Resource |
---|---|
https://www.wordfence.com/blog/2020/04/unpatched-high-severity-vulnerability-in-widget-settings-importer-exporter-plugin/ | Exploit Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/e14f0fc6-fca4-4dd7-8f7b-ed5ed535c9af?source=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Dec 2023, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/e14f0fc6-fca4-4dd7-8f7b-ed5ed535c9af?source=cve - Third Party Advisory | |
References | () https://www.wordfence.com/blog/2020/04/unpatched-high-severity-vulnerability-in-widget-settings-importer-exporter-plugin/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:porternovelli:widget_settings_importer\/exporter:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-79 | |
First Time |
Porternovelli widget Settings Importer\/exporter
Porternovelli |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
23 Dec 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-23 10:15
Updated : 2024-02-28 20:54
NVD link : CVE-2020-36769
Mitre link : CVE-2020-36769
CVE.ORG link : CVE-2020-36769
JSON object : View
Products Affected
porternovelli
- widget_settings_importer\/exporter
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')