cve/2023/CVE-2023-6485.md

18 lines
885 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-6485](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6485)
![](https://img.shields.io/static/v1?label=Product&message=Html5%20Video%20Player&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.5.19%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Html5 Video Player WordPress plugin before 2.5.19 does not sanitise and escape some of its player settings, which combined with missing capability checks around the plugin could allow any authenticated users, such as low as subscribers to perform Stored Cross-Site Scripting attacks against high privilege users like admins
### POC
#### Reference
- https://wpscan.com/vulnerability/759b3866-c619-42cc-94a8-0af6d199cc81
#### Github
No PoCs found on GitHub currently.