The YaDisk Files WordPress plugin through 1.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Metrics
Affected Vendors & Products
References
History
Mon, 25 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Yadisk Files
Yadisk Files yadisk Files |
|
CPEs | cpe:2.3:a:yadisk_files:yadisk_files:*:*:*:*:*:*:*:* | |
Vendors & Products |
Yadisk Files
Yadisk Files yadisk Files |
|
Metrics |
cvssV3_1
|
Mon, 25 Nov 2024 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | YaDisk Files <= 1.2.5 - Contributor+ Stored XSS via Shortcode |
Mon, 25 Nov 2024 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The YaDisk Files WordPress plugin through 1.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: WPScan
Published: 2024-11-25T06:00:01.883Z
Updated: 2024-11-25T20:41:38.302Z
Reserved: 2024-11-01T19:51:27.086Z
Link: CVE-2024-10709
Vulnrichment
Updated: 2024-11-25T20:35:23.881Z
NVD
Status : Received
Published: 2024-11-25T06:15:04.573
Modified: 2024-11-25T21:15:08.837
Link: CVE-2024-10709
Redhat
No data.