Description
The Word Balloon WordPress plugin before 4.19.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-52049 | The Word Balloon WordPress plugin before 4.19.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. |
References
History
Thu, 03 Apr 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-03T12:58:53.511Z
Reserved: 2022-12-27T08:39:26.189Z
Link: CVE-2022-4751
Updated: 2024-08-03T01:48:40.233Z
Status : Modified
Published: 2023-01-23T15:15:17.377
Modified: 2025-04-03T13:15:42.123
Link: CVE-2022-4751
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD