The WP Image Carousel WordPress plugin through 1.0.2 does not sanitise and escape some parameters, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/58649228-69a6-4028-8487-166b0a07fcf7 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/58649228-69a6-4028-8487-166b0a07fcf7 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/58649228-69a6-4028-8487-166b0a07fcf7 - Exploit, Third Party Advisory |
31 Mar 2023, 15:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wp_image_carousel_project:wp_image_carousel:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/58649228-69a6-4028-8487-166b0a07fcf7 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
27 Mar 2023, 17:04
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-27 16:15
Updated : 2024-11-21 07:37
NVD link : CVE-2023-0589
Mitre link : CVE-2023-0589
CVE.ORG link : CVE-2023-0589
JSON object : View
Products Affected
wp_image_carousel_project
- wp_image_carousel
CWE
No CWE.