The WP ULike WordPress plugin before 4.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 02 Oct 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Technowich wp Ulike
|
|
| CPEs | cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Technowich wp Ulike - Most Advanced Wordpress Marketing Toolkit
|
Technowich wp Ulike
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-01T21:33:03.283Z
Reserved: 2024-06-17T18:50:11.250Z
Link: CVE-2024-6094
Updated: 2024-08-01T21:33:03.283Z
Status : Modified
Published: 2024-07-24T06:15:01.903
Modified: 2024-11-21T09:48:56.847
Link: CVE-2024-6094
No data.
OpenCVE Enrichment
No data.
Weaknesses