2 results (0.002 seconds)

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 1

The EasyEvent WordPress plugin through 1.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed El complemento EasyEvent WordPress hasta la versión 1.0.0 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con altos privilegios, como el administrador, realizar ataques de cross site scripting incluso cuando unfiltered_html no está permitido. The EasyEvent plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. • https://wpscan.com/vulnerability/171af8eb-ceeb-403a-abc2-969d9535a4c9 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.8EPSS: 0%CPEs: 3EXPL: 0

Cross-site scripting (XSS) vulnerability in index.php in easyEvent 1.2 allows remote attackers to inject arbitrary web script or HTML via the curr_year parameter. • http://secunia.com/advisories/20038 http://securitytracker.com/id?1016105 http://www.osvdb.org/25341 http://www.securityfocus.com/bid/17891 http://www.vupen.com/english/advisories/2006/1695 https://exchange.xforce.ibmcloud.com/vulnerabilities/26332 •