The WP Mailto Links – Protect Email Addresses plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wpml_mailto' shortcode in versions up to, and including, 3.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This was partially patched in version 3.1.3 and fully patched in version 3.1.4.
References
Configurations
History
27 Oct 2023, 18:45
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/ec882062-0059-47ca-a007-3347e7adb70b?source=cve - Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/browser/wp-mailto-links/tags/3.1.2/core/includes/classes/class-wp-mailto-links-validate.php#L582 - Exploit | |
CWE | CWE-79 | |
First Time |
Ironikus wp Mailto Links
Ironikus |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CPE | cpe:2.3:a:ironikus:wp_mailto_links:*:*:*:*:*:wordpress:*:* |
20 Oct 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-20 08:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-5109
Mitre link : CVE-2023-5109
CVE.ORG link : CVE-2023-5109
JSON object : View
Products Affected
ironikus
- wp_mailto_links
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')