A stored XSS vulnerability in the Visualizer plugin 3.3.0 for WordPress allows an unauthenticated attacker to execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. This occurs because classes/Visualizer/Gutenberg/Block.php registers wp-json/visualizer/v1/update-chart with no access control, and classes/Visualizer/Render/Page/Data.php lacks output sanitization.
References
Link | Resource |
---|---|
https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf | Exploit Third Party Advisory |
https://wordpress.org/plugins/visualizer/#developers | Product Release Notes |
https://wpvulndb.com/vulnerabilities/9893 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-10-03T18:34:45
Updated: 2019-10-04T13:54:15
Reserved: 2019-09-27T00:00:00
Link: CVE-2019-16931
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-10-03T19:15:09.770
Modified: 2019-10-09T19:50:44.743
Link: CVE-2019-16931
JSON object: View
Redhat Information
No data.
CWE