The Yuzo Related Posts plugin 5.12.94 for WordPress has XSS because it mistakenly expects that is_admin() verifies that the request comes from an admin user (it actually only verifies that the request is for an admin page). An unauthenticated attacker can inject a payload into the plugin settings, such as the yuzo_related_post_css_and_style setting.
References
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpvulndb.com/vulnerabilities/9254 - | |
References | () https://www.pluginvulnerabilities.com/2019/03/30/wordpress-plugin-team-paints-target-on-exploitable-settings-change-vulnerability-that-permits-persistent-xss-in-related-posts/ - | |
References | () https://www.wordfence.com/blog/2019/04/yuzo-related-posts-zero-day-vulnerability-exploited-in-the-wild/ - Exploit, Third Party Advisory |
Information
Published : 2019-05-09 23:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11869
Mitre link : CVE-2019-11869
CVE.ORG link : CVE-2019-11869
JSON object : View
Products Affected
yuzopro
- yuzo
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')