CVE-2022-4199

The Link Library WordPress plugin before 7.4.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Configurations

Configuration 1 (hide)

cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/c4688c0b-0538-4151-995c-d437d7e4829d - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/c4688c0b-0538-4151-995c-d437d7e4829d - Exploit, Third Party Advisory

10 Oct 2024, 16:59

Type Values Removed Values Added
CPE cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:* cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*
Summary
  • (es) El complemento Link Library de WordPress anterior a 7.4.1 no sanitiza ni escapa algunas de sus configuraciones, lo que podría permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio).
First Time Ylefebvre link Library
Ylefebvre

07 Nov 2023, 03:57

Type Values Removed Values Added
CWE CWE-79

Information

Published : 2023-01-16 16:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-4199

Mitre link : CVE-2022-4199

CVE.ORG link : CVE-2022-4199


JSON object : View

Products Affected

ylefebvre

  • link_library
CWE

No CWE.