The plugin does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Insert the following shortcode in a post: [cl-review el_class=‘" onmouseover=“alert(/XSS/)”’]
CPE | Name | Operator | Version |
---|---|---|---|
codelights-shortcodes-and-widgets | eq | * |