1 results (0.002 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The My Calendar WordPress plugin before 3.4.24 does not sanitise and escape some parameters, which could allow users with a role as low as Subscriber to perform Cross-Site Scripting attacks (depending on the permissions set by the admin) El complemento My Calendar de WordPress anterior a la versión 3.4.24 no desinfecta ni escapa a algunos parámetros, lo que podría permitir a los usuarios con un rol tan bajo como Suscriptor realizar ataques de cross-site scripting (dependiendo de los permisos establecidos por el administrador). The My Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via events in all versions up to, and including, 3.4.23 due to insufficient input sanitization and output escaping on event dates. This makes it possible for authenticated attackers with, admin-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c46864e9f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •