Описание
The Testimonial Carousel For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions less than, or equal to, 11.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
The Testimonial Carousel For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions less than, or equal to, 11.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-8666
- https://plugins.trac.wordpress.org/browser/testimonials-carousel-elementor/tags/11.6.2/widgets/animated-carousel/class-testimonialscarousel-coverflow.php#L1425
- https://plugins.trac.wordpress.org/browser/testimonials-carousel-elementor/tags/11.6.2/widgets/animated-carousel/class-testimonialscarousel-coverflow.php#L1443
- https://plugins.trac.wordpress.org/browser/testimonials-carousel-elementor/tags/11.6.2/widgets/animated-carousel/class-testimonialscarousel-cube.php#L913
- https://plugins.trac.wordpress.org/browser/testimonials-carousel-elementor/tags/11.6.2/widgets/section-with-carousel/class-section-with-cube.php#L1167
- https://plugins.trac.wordpress.org/browser/testimonials-carousel-elementor/tags/11.6.2/widgets/testimonials-carousel/class-testimonialscarousel-blog.php#L1192
- https://www.wordfence.com/threat-intel/vulnerabilities/id/1f5c3b2c-1ed2-47e1-8e39-cbe6f2973d15?source=cve
Связанные уязвимости
The Testimonial Carousel For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions less than, or equal to, 11.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.