1 results (0.002 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The Responsive Lightbox2 WordPress plugin before 1.0.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks El complemento Responsive Lightbox2 de WordPress anterior a 1.0.4 no valida ni escapa algunos de sus atributos de código corto antes de devolverlos a la página, lo que podría permitir a los usuarios con un rol tan bajo como colaborador realizar ataques de cross site scripting almacenado. The Responsive Lightbox2 plugin for WordPress is vulnerable to Authenticated (Contributor+) Stored Cross-Site Scripting via the plugin's shortcode parameters (title, url, hyperlink) in the shortcode_handler function in versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/d9309a09-34ba-4e56-b683-e677ad277b29 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •