Описание
A stored cross-site scripting (XSS) issue in Envira Gallery Lite before 1.8.3.3 allows remote attackers to inject arbitrary JavaScript/HTML code via a POST /wp-admin/admin-ajax.php request with the meta[title] parameter.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- Release NotesThird Party Advisory
- https://github.com/enviragallery/envira-gallery-lite/commit/102651514e6faca914ec1c7e113def340d8e1e09PatchThird Party Advisory
- https://github.com/enviragallery/envira-gallery-lite/commit/3b081dd10a1731f8cd981bebeac0e775fb217acfPatchThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- Release NotesThird Party Advisory
- https://github.com/enviragallery/envira-gallery-lite/commit/102651514e6faca914ec1c7e113def340d8e1e09PatchThird Party Advisory
- https://github.com/enviragallery/envira-gallery-lite/commit/3b081dd10a1731f8cd981bebeac0e775fb217acfPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.8.3.3 (исключая)
cpe:2.3:a:enviragallery:envira_gallery:*:*:*:*:lite:wordpress:*:*
EPSS
Процентиль: 64%
0.00471
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79
Связанные уязвимости
github
больше 3 лет назад
A stored cross-site scripting (XSS) issue in Envira Gallery Lite before 1.8.3.3 allows remote attackers to inject arbitrary JavaScript/HTML code via a POST /wp-admin/admin-ajax.php request with the meta[title] parameter.
EPSS
Процентиль: 64%
0.00471
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79