The Logo Manager For Enamad WordPress plugin through 0.7.1 does not sanitise and escape in its widgets settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/37b5ed06-0633-49e0-b47d-8aa2f4510179/ | Exploit Third Party Advisory |
Configurations
History
27 Sep 2024, 18:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/37b5ed06-0633-49e0-b47d-8aa2f4510179/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:wp-master:logo_manager_for_enamad:*:*:*:*:*:wordpress:*:* | |
First Time |
Wp-master logo Manager For Enamad
Wp-master |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
CWE | CWE-79 |
17 Sep 2024, 15:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.7 |
17 Sep 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-17 06:15
Updated : 2024-09-27 18:23
NVD link : CVE-2024-5170
Mitre link : CVE-2024-5170
CVE.ORG link : CVE-2024-5170
JSON object : View
Products Affected
wp-master
- logo_manager_for_enamad
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')