The PPWP WordPress plugin before 1.8.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/59c577e9-7d1c-46bc-9218-3e143068738d | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/59c577e9-7d1c-46bc-9218-3e143068738d | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-06 20:15
Updated : 2025-03-25 18:15
NVD link : CVE-2022-4626
Mitre link : CVE-2022-4626
CVE.ORG link : CVE-2022-4626
JSON object : View
Products Affected
passwordprotectwp
- password_protect_wordpress
CWE
No CWE.