2024-12-08 03:06:42 +00:00

29 lines
1.3 KiB
JSON

{
"id": "CVE-2024-3075",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-26T05:15:50.433",
"lastModified": "2024-11-21T09:28:50.497",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MM-email2image WordPress plugin through 0.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
},
{
"lang": "es",
"value": "El complemento MM-email2image de WordPress hasta la versi\u00f3n 0.2.5 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el c\u00f3digo corto, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting Almacenado."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}