CVE-2022-4571

The Seriously Simple Podcasting WordPress plugin before 2.19.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Configurations

Configuration 1 (hide)

cpe:2.3:a:castos:seriously_simple_podcasting:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
Summary
  • (es) El complemento Seriously Simple Podcasting de WordPress anterior a 2.19.1 no valida ni escapa algunos de sus atributos de código corto antes de devolverlos a la página, lo que podría permitir a los usuarios con un rol tan bajo como colaborador realizar ataques de cross-site scripting almacenado que podrían ser utilizados contra usuarios con privilegios elevados, como administradores.
References () https://wpscan.com/vulnerability/128b150b-3950-4cc5-b46a-5707f7a0df00 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/128b150b-3950-4cc5-b46a-5707f7a0df00 - Exploit, Third Party Advisory

07 Nov 2023, 03:58

Type Values Removed Values Added
CWE CWE-79

Information

Published : 2023-01-16 16:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4571

Mitre link : CVE-2022-4571

CVE.ORG link : CVE-2022-4571


JSON object : View

Products Affected

castos

  • seriously_simple_podcasting
CWE

No CWE.