The Smush WordPress plugin before 3.9.9 does not sanitise and escape a configuration parameter before outputting it back in an admin page when uploading a malicious preset configuration, leading to a Reflected Cross-Site Scripting. For the attack to be successful, an attacker would need an admin to upload a malicious configuration file
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/bb5af08f-bb19-46a1-a7ac-8381f428c11e | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-05-30T08:35:37
Updated: 2022-05-30T08:35:37
Reserved: 2022-03-17T00:00:00
Link: CVE-2022-1009
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-30T09:15:08.900
Modified: 2022-06-08T17:20:48.553
Link: CVE-2022-1009
JSON object: View
Redhat Information
No data.
CWE