Description
The Editorial Calendar WordPress plugin before 3.8.3 does not sanitise and escape its settings, allowing users with roles as low as contributor to inject arbitrary web scripts in the plugin admin panel, enabling a Stored Cross-Site Scripting vulnerability targeting higher privileged users.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51483 | The Editorial Calendar WordPress plugin before 3.8.3 does not sanitise and escape its settings, allowing users with roles as low as contributor to inject arbitrary web scripts in the plugin admin panel, enabling a Stored Cross-Site Scripting vulnerability targeting higher privileged users. |
References
History
Wed, 27 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-11-27T19:38:53.182Z
Reserved: 2022-11-22T07:48:45.508Z
Link: CVE-2022-4115
Updated: 2024-08-03T01:27:54.445Z
Status : Modified
Published: 2023-06-27T14:15:10.077
Modified: 2024-11-21T07:34:36.490
Link: CVE-2022-4115
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD