CVE-2022-4207

The Image Hover Effects Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several values that can be added to an Image Hover in versions 9.8.1 to 9.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, the plugin only allows administrators access to edit Image Hovers, however, if a site admin makes the plugin's features available to lower privileged users through the 'Who Can Edit?' setting then this can be exploited by those users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oxilab:image_hover_effects_ultimate:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
Summary
  • (es) Image Hover Effects Ultimate complemento para WordPress es vulnerable a Cross-Site Scripting Almacenado a través de varios valores que se pueden agregar a Image Hover en las versiones 9.8.1 a 9.8.4 debido a una sanitización de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados inyecten scripts web arbitrarios en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. De forma predeterminada, el complemento solo permite a los administradores acceder para editar Image Hovers; sin embargo, si un administrador del sitio pone las funciones del complemento a disposición de usuarios con privilegios inferiores a través de la opción "Who Can Edit?" entonces esto puede ser explotado por esos usuarios.
References () https://github.com/MrOxizen/image-hover-effects-ultimate/commit/4ba784e1a2a0cf02e8b8cbe3db7323735d7dedc9 - Patch, Third Party Advisory () https://github.com/MrOxizen/image-hover-effects-ultimate/commit/4ba784e1a2a0cf02e8b8cbe3db7323735d7dedc9 - Patch, Third Party Advisory
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2830197%40image-hover-effects-ultimate&new=2830197%40image-hover-effects-ultimate&sfp_email=&sfph_mail= - Third Party Advisory () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2830197%40image-hover-effects-ultimate&new=2830197%40image-hover-effects-ultimate&sfp_email=&sfph_mail= - Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/f00cdef3-d733-4e85-8099-204ef76096b4 - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/f00cdef3-d733-4e85-8099-204ef76096b4 - Third Party Advisory
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 5.5

Information

Published : 2022-12-13 21:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-4207

Mitre link : CVE-2022-4207

CVE.ORG link : CVE-2022-4207


JSON object : View

Products Affected

oxilab

  • image_hover_effects_ultimate
CWE

No CWE.