The Font Awesome WordPress plugin before 4.3.2 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-16 16:15
Updated : 2024-11-21 07:35
NVD link : CVE-2022-4478
Mitre link : CVE-2022-4478
CVE.ORG link : CVE-2022-4478
JSON object : View
Products Affected
fontawesome
- font_awesome
CWE
No CWE.