The LayerSlider WordPress plugin before 7.1.2 does not sanitise and escape Project's slug before outputting it back in various place, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4 | Exploit Third Party Advisory |
Configurations
History
03 May 2022, 17:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 4.8 |
References | (MISC) https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:layslider:layslider:*:*:*:*:*:wordpress:*:* |
25 Apr 2022, 16:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-25 16:16
Updated : 2024-04-26 16:08
NVD link : CVE-2022-1153
Mitre link : CVE-2022-1153
CVE.ORG link : CVE-2022-1153
JSON object : View
Products Affected
layslider
- layslider
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')