A Stored XSS vulnerability has been found in the administration page of the WTI Like Post plugin through 1.4.5 for WordPress. Once the administrator has submitted the data, the script stored is executed for all the users visiting the website.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/wti-like-post/#developers | Product Third Party Advisory |
https://wpvulndb.com/vulnerabilities/10210 | Third Party Advisory |
https://wordpress.org/plugins/wti-like-post/#developers | Product Third Party Advisory |
https://wpvulndb.com/vulnerabilities/10210 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/wti-like-post/#developers - Product, Third Party Advisory | |
References | () https://wpvulndb.com/vulnerabilities/10210 - Third Party Advisory |
Information
Published : 2020-05-05 16:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8799
Mitre link : CVE-2020-8799
CVE.ORG link : CVE-2020-8799
JSON object : View
Products Affected
webtechideas
- wti_like_post
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')