Description
The Clean Login WordPress plugin before 1.13.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-52115 | The Clean Login WordPress plugin before 1.13.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. |
References
History
Tue, 25 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-25T20:38:05.060Z
Reserved: 2022-12-29T08:50:24.522Z
Link: CVE-2022-4838
Updated: 2024-08-03T01:55:45.769Z
Status : Modified
Published: 2023-02-06T20:15:12.620
Modified: 2025-03-25T21:15:39.693
Link: CVE-2022-4838
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD