Lucene search

K
wpvulndbWpvulndbWPVDB-ID:D4D59E27-94F1-470D-92E1-F649E2566B3E
HistoryDec 08, 2023 - 12:00 a.m.

Client Dash <= 2.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings

2023-12-0800:00:00
wpscan.com
2
wordpress
client dash
stored cross-site scripting
admin settings
input sanitization
output escaping
multi-site installations
unfiltered_html
cve-2019-17071

5.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.2%

Description The Client Dash plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Note that this may be a duplicate of CVE-2019-17071

5.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.2%

Related for WPVDB-ID:D4D59E27-94F1-470D-92E1-F649E2566B3E