2 results (0.005 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The Video.js WordPress plugin through 4.5.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks The Video.js – HTML5 Video Player for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping on user supplied attributes such as 'class'. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page • https://wpscan.com/vulnerability/fdad356f-cae4-4390-9a62-605201cee0c0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 3

This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code. Esto afecta al paquete video.js antes de la versión 7.14.3. El atributo src de la etiqueta track permite eludir el escape de HTML y ejecutar código arbitrario • https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •