4 results (0.001 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The Smash Balloon Social Post Feed WordPress plugin before 4.1.6 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins. El complemento Smash Balloon Social Post Feed de WordPress anterior a 4.1.6 no valida ni escapa algunos de sus atributos de código corto antes de devolverlos a la página, lo que podría permitir a los usuarios con un rol tan bajo como colaborador realizar ataques de cross-site scripting entre administradores conectados. The Smash Balloon Social Post Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcode in versions up to, and including, 4.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/c32a4c58-9f2b-4afa-9a21-4b4a5c4c4c41 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The Smash Balloon Social Post Feed WordPress plugin before 4.1.1 was affected by a reflected XSS in custom-facebook-feed in cff-top admin page. El plugin Smash Balloon Social Post Feed de WordPress versiones anteriores a 4.1.1, estaba afectado por un ataque de tipo XSS reflejado en custom-facebook-feed en la página de administración cff-top • https://wpscan.com/vulnerability/ae1aab4e-b00a-458b-a176-85761655bdcc • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The Smash Balloon Social Post Feed WordPress plugin before 4.0.1 did not have any privilege or nonce validation before saving the plugin's setting. As a result, any logged-in user on a vulnerable site could update the settings and store rogue JavaScript on each of its posts and pages. El plugin Smash Balloon Social Post Feed de WordPress versiones anteriores a 4.0.1, no presentaba ninguna comprobación de privilegios o nonce antes de guardar la configuración del plugin. Como resultado, cualquier usuario conectado en un sitio vulnerable podía actualizar la configuración y almacenar JavaScript falso en cada una de sus publicaciones y páginas • https://jetpack.com/2021/10/29/security-issues-patched-in-smash-balloon-social-post-feed-plugin https://wpscan.com/vulnerability/5d252ad7-bf28-44f3-8cd0-c4fe05c48f35 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Smash Balloon Social Post Feed WordPress plugin before 2.19.2 does not sanitise or escape the feedID POST parameter in its feed_locator AJAX action (available to both authenticated and unauthenticated users) before outputting a truncated version of it in the admin dashboard, leading to an unauthenticated Stored Cross-Site Scripting issue which will be executed in the context of a logged in administrator. El plugin Smash Balloon Social Post Feed de WordPress versiones anteriores a 2.19.2, no sanea ni escapa del parámetro feedID POST en su acción feed_locator AJAX (disponible tanto para usuarios autenticados como no autenticados) antes de mostrar una versión truncada de la misma en el panel de administración, conllevando a un problema de tipo Cross-Site Scripting Almacenado no autenticado que se ejecutará en el contexto de un administrador conectado • https://wpscan.com/vulnerability/2b543740-d4b0-49b5-a021-454a3a72162f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •