Page 2 of 6 results (0.003 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The Post SMTP Mailer/Email Log WordPress plugin before 2.1.4 does not escape some of its settings before outputting them in the admins dashboard, allowing high privilege users to perform Cross-Site Scripting attacks against other users even when the unfiltered_html capability is disallowed. El plugin Post SMTP Mailer/Email Log de WordPress versiones anteriores a 2.1.4, no escapa de algunas de sus configuraciones antes de mostrarlas en el panel de control de los administradores, lo que permite a usuarios con altos privilegios llevar a cabo ataques de tipo Cross-Site Scripting contra otros usuarios, incluso cuando la capacidad unfiltered_html no está permitida The Post SMTP Mailer/Email Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘input_tmp_dir’ parameter in versions up to, and including, 2.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/f3fda033-58f5-446d-ade4-2336a39bfb87 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •