The Clean Login WordPress plugin before 1.13.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/9937e369-60e8-451c-8790-1a83a59115fc | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/9937e369-60e8-451c-8790-1a83a59115fc | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/9937e369-60e8-451c-8790-1a83a59115fc - Exploit, Third Party Advisory |
Information
Published : 2023-02-06 20:15
Updated : 2024-11-21 07:36
NVD link : CVE-2022-4838
Mitre link : CVE-2022-4838
CVE.ORG link : CVE-2022-4838
JSON object : View
Products Affected
codection
- clean_login
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')