2 results (0.009 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The chartjs WordPress plugin through 2023.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). El complemento chartjs de WordPress hasta 2023.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio). The enigma-chartjs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the chart functionality in versions up to and including 2023.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://lynk.nl https://wpscan.com/vulnerability/c3d43aac-66c8-4218-b3f0-5256f895eda3 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 1

The chartjs WordPress plugin through 2023.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). El complemento chartjs de WordPress hasta 2023.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio). The enigma-chartjs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an unknown parameter in versions up to and including 2023.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://lynk.nl https://wpscan.com/vulnerability/5f011911-5fd1-46d9-b468-3062b4ec6f1e • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •