3 results (0.011 seconds)

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. Vulnerable parameters: 1 - "Newsletter" tab, &yith_maintenance_newsletter_submit_label parameter: payload should start with a single quote (') symbol to break the context, i.e.: NOTIFY ME' autofocus onfocus=alert(/Visse/);// v=' - this payload will be auto triggered while admin visits this page/tab. 2 - "General" tab issues, vulnerable parameters: &yith_maintenance_message, &yith_maintenance_custom_style, &yith_maintenance_mascotte, &yith_maintenance_title_font[size], &yith_maintenance_title_font[family], &yith_maintenance_title_font[color], &yith_maintenance_paragraph_font[size], &yith_maintenance_paragraph_font[family], &yith_maintenance_paragraph_font[color], &yith_maintenance_border_top. 3 - "Background" tab issues, vulnerable parameters: &yith_maintenance_background_image, &yith_maintenance_background_color. 4 - "Logo" tab issues, vulnerable parameters: &yith_maintenance_logo_image, &yith_maintenance_logo_tagline, &yith_maintenance_logo_tagline_font[size], &yith_maintenance_logo_tagline_font[family], &yith_maintenance_logo_tagline_font[color]. 5 - "Newsletter" tab issues, vulnerable parameters: &yith_maintenance_newsletter_email_font[size], &yith_maintenance_newsletter_email_font[family], &yith_maintenance_newsletter_email_font[color], &yith_maintenance_newsletter_submit_font[size], &yith_maintenance_newsletter_submit_font[family], &yith_maintenance_newsletter_submit_font[color], &yith_maintenance_newsletter_submit_background, &yith_maintenance_newsletter_submit_background_hover, &yith_maintenance_newsletter_title, &yith_maintenance_newsletter_action, &yith_maintenance_newsletter_email_label, &yith_maintenance_newsletter_email_name, &yith_maintenance_newsletter_submit_label, &yith_maintenance_newsletter_hidden_fields. 6 - "Socials" tab issues, vulnerable parameters: &yith_maintenance_socials_facebook, &yith_maintenance_socials_twitter, &yith_maintenance_socials_gplus, &yith_maintenance_socials_youtube, &yith_maintenance_socials_rss, &yith_maintenance_socials_skype, &yith_maintenance_socials_email, &yith_maintenance_socials_behance, &yith_maintenance_socials_dribble, &yith_maintenance_socials_flickr, &yith_maintenance_socials_instagram, &yith_maintenance_socials_pinterest, &yith_maintenance_socials_tumblr, &yith_maintenance_socials_linkedin. Múltiples vulnerabilidades de tipo Cross-Site Scripting (XSS) Almacenado y Autenticado en YITH Maintenance Mode (plugin de WordPress) versiones anteriores a 1.3.8 incluyéndola, hay 46 parámetros vulnerables que fueron pasados por alto por el proveedor mientras parcheaba la versión 1.3.7 a la 1.3.8. Parámetros vulnerables: 1 - Pestaña "Newsletter", parámetro &amp;yith_maintenance_newsletter_submit_label: el payload debe comenzar con un símbolo de comillas simples (') para romper el contexto, es decir: NOTIFY ME' autofocus onfocus=alert(/Visse/);// v=' - este payload se autodesencadenará mientras el administrador visite esta página/pestaña. 2 - Problemas de la pestaña "General", parámetros vulnerables: &amp;yith_maintenance_message, &amp;yith_maintenance_custom_style, &amp;yith_maintenance_mascotte, &amp;yith_maintenance_title_font[size], &amp;yith_maintenance_title_font[family], &amp;yith_maintenance_title_font[color], &amp;yith_maintenance_paragraph_font[size], &amp;yith_maintenance_paragraph_font[family], &amp;yith_maintenance_paragraph_font[color], &amp;yith_maintenance_border_top. 3 - Problemas con la pestaña "Background", parámetros vulnerables: &amp;yith_maintenance_background_image, &amp;yith_maintenance_background_color. 4 - Problemas con la pestaña "Logo", parámetros vulnerables: &amp;yith_maintenance_logo_image, &amp;yith_maintenance_logo_tagline_font, &amp;yith_maintenance_logo_tagline_font[size], &amp;yith_maintenance_logo_tagline_font[family], &amp;yith_maintenance_logo_tagline_font[color]. 5 - Problemas con la pestaña "Newsletter", parámetros vulnerables: &amp;yith_maintenance_newsletter_email_font[size], &amp;yith_maintenance_newsletter_email_font[family], &amp;yith_maintenance_newsletter_email_font[color], &amp;yith_maintenance_newsletter_submit_font[size], &amp;yith_maintenance_newsletter_submit_font[family], &amp;yith_maintenance_newsletter_submit_font[color], &amp;yith_maintenance_newsletter_submit_background, &amp;yith_maintenance_newsletter_submit_background_hover, &amp;yith_maintenance_newsletter_title, &amp;yith_maintenance_newsletter_action, &amp;yith_maintenance_newsletter_email_label, &amp;yith_maintenance_newsletter_email_name, &amp;yith_maintenance_newsletter_submit_label, &amp;yith_maintenance_newsletter_hidden_fields. 6 - Problemas de la pestaña "Socials", parámetros vulnerables: &amp;yith_maintenance_socials_facebook, &amp;yith_maintenance_socials_twitter, &amp;yith_maintenance_socials_gplus, &amp;yith_maintenance_socials_youtube, &amp;yith_maintenance_socials_rss, &amp;yith_maintenance_socials_skype, &amp;yith_maintenance_socials_email, &amp;yith_maintenance_socials_behance, &amp;yith_maintenance_socials_dribble, &amp;yith_maintenance_socials_flickr, &amp;yith_maintenance_socials_instagram, &amp;yith_maintenance_socials_pinterest, &amp;yith_maintenance_socials_tumblr, &amp;yith_maintenance_socials_linkedin • https://patchstack.com/database/vulnerability/yith-maintenance-mode/wordpress-yith-maintenance-mode-plugin-1-3-8-multiple-authenticated-stored-cross-site-scripting-xss-vulnerabilities https://wordpress.org/plugins/yith-maintenance-mode/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

Authenticated Stored Cross-Site Scripting (XSS) vulnerability in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.7, vulnerable parameter &yith_maintenance_newsletter_submit_label. Possible even when unfiltered HTML is disallowed by WordPress configuration. Una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado y Autenticado en YITH Maintenance Mode (plugin de WordPress) versiones anteriores a 1.3.7 incluyéndola, parámetro vulnerable &amp;yith_maintenance_newsletter_submit_label. Posible incluso cuando el HTML sin filtrar no está permitido por la configuración de WordPress • https://patchstack.com/database/vulnerability/yith-maintenance-mode/wordpress-yith-maintenance-mode-plugin-1-3-7-authenticated-stored-cross-site-scripting-xss-vulnerability https://wordpress.org/plugins/yith-maintenance-mode/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

The yith-maintenance-mode plugin before 1.2.0 for WordPress has CSRF with resultant XSS via the wp-admin/themes.php?page=yith-maintenance-mode panel_page parameter. El plugin yith-maintenance-mode versiones anteriores a 1.2.0 para WordPress, presenta una vulnerabilidad de tipo CSRF con un XSS resultante por medio del parámetro panel_page de wp-admin/themes.php?page=yith-maintenance-mode. • http://cinu.pl/research/wp-plugins/mail_3a14a77571c73684103e0f517a92d757.html https://wordpress.org/plugins/yith-maintenance-mode/#developers https://wpvulndb.com/vulnerabilities/8285 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-352: Cross-Site Request Forgery (CSRF) •