The MM-email2image WordPress plugin through 0.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Vendor | Product | Version | CPE |
---|---|---|---|
belden | tofino_argon_fa\-tsa\-220\-mm\/mm | * | cpe:2.3:h:belden:tofino_argon_fa\-tsa\-220\-mm\/mm:*:*:*:*:*:*:*:* |
[
{
"vendor": "Unknown",
"product": "MM-email2image",
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThanOrEqual": "0.2.5"
}
],
"defaultStatus": "affected"
}
]