The plugin does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[smls_guten_block heading=‘XSS’ heading_tag=‘h2 onmouseover=“alert(1)”’]
CPE | Name | Operator | Version |
---|---|---|---|
smart-logo-showcase-lite | eq | * |