1 results (0.004 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The Email Encoder WordPress plugin before 2.2.2 does not escape the WP_Email_Encoder_Bundle_options[protection_text] parameter before outputting it back in an attribute in an admin page, leading to a Stored Cross-Site Scripting The Email Encoder – Protect Email Addresses and Phone Numbers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'WP_Email_Encoder_Bundle_options[protection_text]' parameter in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. • https://wpscan.com/vulnerability/8f2ac76c-f3f8-41f9-a32a-f414825cf6f1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •