The plugin does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Note: A Set needs to be present [op-is-open set_id=‘1’ classes=‘" onmouseover=“alert(1)” style=“background:red;”’]
CPE | Name | Operator | Version |
---|---|---|---|
wp-opening-hours | eq | * |