CVE-2024-4483 – Email Encoder < 2.2.2 - Admin+ Stored XSS
https://notcve.org/view.php?id=CVE-2024-4483
The Email Encoder WordPress plugin before 2.2.2 does not escape the WP_Email_Encoder_Bundle_options[protection_text] parameter before outputting it back in an attribute in an admin page, leading to a Stored Cross-Site Scripting The Email Encoder – Protect Email Addresses and Phone Numbers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'WP_Email_Encoder_Bundle_options[protection_text]' parameter in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. • https://wpscan.com/vulnerability/8f2ac76c-f3f8-41f9-a32a-f414825cf6f1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •