The Editorial Calendar WordPress plugin before 3.8.3 does not sanitise and escape its settings, allowing users with roles as low as contributor to inject arbitrary web scripts in the plugin admin panel, enabling a Stored Cross-Site Scripting vulnerability targeting higher privileged users.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/2b5071e1-9532-4a6c-9da4-d07932474ca4 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/2b5071e1-9532-4a6c-9da4-d07932474ca4 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/2b5071e1-9532-4a6c-9da4-d07932474ca4 - Exploit, Third Party Advisory |
14 Aug 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The Editorial Calendar WordPress plugin before 3.8.3 does not sanitise and escape its settings, allowing users with roles as low as contributor to inject arbitrary web scripts in the plugin admin panel, enabling a Stored Cross-Site Scripting vulnerability targeting higher privileged users. |
03 Jul 2023, 20:37
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-27 14:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4115
Mitre link : CVE-2022-4115
CVE.ORG link : CVE-2022-4115
JSON object : View
Products Affected
editorial_calendar_project
- editorial_calendar
CWE
No CWE.