Description
The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field "Custom Patreon Page name", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
References
https://plugins.trac.wordpress.org/changeset/2682069
PatchThird Party Advisory
https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe
ExploitThird Party Advisory
https://plugins.trac.wordpress.org/changeset/2682069
PatchThird Party Advisory
https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
5.5 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2022-03-14T14:15:09.123Z
3 years agoLast modified
2024-11-21T04:54:12.690Z
1 year ago