The Zalomení WordPress plugin through 1.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/a8a706c6-7f0f-4148-9f6f-40c0ca95dd9a/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/a8a706c6-7f0f-4148-9f6f-40c0ca95dd9a/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-01-31 06:15
Updated : 2025-05-23 15:59
NVD link : CVE-2024-12872
Mitre link : CVE-2024-12872
CVE.ORG link : CVE-2024-12872
JSON object : View
Products Affected
honzaskypala
- zalomeni
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
