The LH Add Media From Url plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘lh_add_media_from_url-file_url’ parameter in all versions up to, and including, 1.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Wed, 21 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 21 Aug 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The LH Add Media From Url plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘lh_add_media_from_url-file_url’ parameter in all versions up to, and including, 1.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
Title | LH Add Media From Url <= 1.23 - Reflected Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-08-21T05:30:23.166Z
Updated: 2024-08-21T13:26:50.091Z
Reserved: 2024-07-24T18:19:07.080Z
Link: CVE-2024-7090
Vulnrichment
Updated: 2024-08-21T13:26:39.778Z
NVD
Status : Awaiting Analysis
Published: 2024-08-21T06:15:10.800
Modified: 2024-08-21T12:30:33.697
Link: CVE-2024-7090
Redhat
No data.