The plugin does not escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Put the following payload in the “Post Per Page” or “Enter Search Text”: settings of the plugin: "autofocus onfocus=alert(1)//
CPE | Name | Operator | Version |
---|---|---|---|
easily-generate-rest-api-url | eq | * |