CVE-2019-11869

The Yuzo Related Posts plugin 5.12.94 for WordPress has XSS because it mistakenly expects that is_admin() verifies that the request comes from an admin user (it actually only verifies that the request is for an admin page). An unauthenticated attacker can inject a payload into the plugin settings, such as the yuzo_related_post_css_and_style setting.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yuzopro:yuzo:5.12.94:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () https://wpvulndb.com/vulnerabilities/9254 - () https://wpvulndb.com/vulnerabilities/9254 -
References () https://www.pluginvulnerabilities.com/2019/03/30/wordpress-plugin-team-paints-target-on-exploitable-settings-change-vulnerability-that-permits-persistent-xss-in-related-posts/ - () https://www.pluginvulnerabilities.com/2019/03/30/wordpress-plugin-team-paints-target-on-exploitable-settings-change-vulnerability-that-permits-persistent-xss-in-related-posts/ -
References () https://www.wordfence.com/blog/2019/04/yuzo-related-posts-zero-day-vulnerability-exploited-in-the-wild/ - Exploit, Third Party Advisory () https://www.wordfence.com/blog/2019/04/yuzo-related-posts-zero-day-vulnerability-exploited-in-the-wild/ - Exploit, Third Party Advisory

Information

Published : 2019-05-09 23:29

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11869

Mitre link : CVE-2019-11869

CVE.ORG link : CVE-2019-11869


JSON object : View

Products Affected

yuzopro

  • yuzo
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')