The Client Logo Carousel WordPress plugin through 3.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/e5599968-a435-405a-8829-9840a2144987 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/e5599968-a435-405a-8829-9840a2144987 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/e5599968-a435-405a-8829-9840a2144987 - Exploit, Third Party Advisory |
16 Mar 2023, 15:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:client_logo_carousel_project:client_logo_carousel:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/e5599968-a435-405a-8829-9840a2144987 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
13 Mar 2023, 17:26
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-13 17:15
Updated : 2024-11-21 07:36
NVD link : CVE-2023-0073
Mitre link : CVE-2023-0073
CVE.ORG link : CVE-2023-0073
JSON object : View
Products Affected
client_logo_carousel_project
- client_logo_carousel
CWE
No CWE.