cve/2023/CVE-2023-0285.md

18 lines
839 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-0285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0285)
![](https://img.shields.io/static/v1?label=Product&message=Real%20Media%20Library%3A%20Media%20Library%20Folder%20%26%20File%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%204.18.29%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Real Media Library WordPress plugin before 4.18.29 does not sanitise and escape the created folder names, which could allow users with the role of author and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348
#### Github
2024-08-08 18:49:29 +00:00
- https://github.com/20142995/nuclei-templates
2024-05-25 21:48:12 +02:00