The LayerSlider WordPress plugin before 7.1.2 does not sanitise and escape Project's slug before outputting it back in various place, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4 | Exploit Third Party Advisory |
Configurations
History
17 Mar 2025, 16:58
Type | Values Removed | Values Added |
---|---|---|
First Time |
Kreaturamedia layerslider
Kreaturamedia |
|
CPE | cpe:2.3:a:kreaturamedia:layerslider:*:*:*:*:*:wordpress:*:* |
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4 - Exploit, Third Party Advisory |
Information
Published : 2022-04-25 16:16
Updated : 2025-03-17 16:58
NVD link : CVE-2022-1153
Mitre link : CVE-2022-1153
CVE.ORG link : CVE-2022-1153
JSON object : View
Products Affected
kreaturamedia
- layerslider
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')