Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7j9q-9jrq-65rh

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.

The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.

EPSS

Процентиль: 39%
0.00171
Низкий

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.4
nvd
больше 4 лет назад

The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.

EPSS

Процентиль: 39%
0.00171
Низкий

Дефекты

CWE-79