The Limit Login Attempts WordPress plugin before 4.0.72 does not sanitise and escape some of its settings, leading to malicious users with administrator privileges to store malicious Javascript code leading to Cross-Site Scripting attacks when unfiltered_html is disallowed (for example in multisite setup)
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/0e74eeb4-89e2-4873-904f-ad4f25c4a8ba | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/0e74eeb4-89e2-4873-904f-ad4f25c4a8ba | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/0e74eeb4-89e2-4873-904f-ad4f25c4a8ba - Exploit, Third Party Advisory |
Information
Published : 2022-06-27 09:15
Updated : 2024-11-21 06:39
NVD link : CVE-2022-1029
Mitre link : CVE-2022-1029
CVE.ORG link : CVE-2022-1029
JSON object : View
Products Affected
miniorange
- limit_login_attempts
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')