The plugin does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Exploit shortcode: [redirect duration=β1β location=βjavascript:alert(1)β] Note: The exploit works on older Safari browsers.
CPE | Name | Operator | Version |
---|---|---|---|
menu-shortcode | eq | * |