Description
The Evaluate WordPress plugin through 1.0 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).
References
https://wpscan.com/vulnerability/8e88a5b9-6f1d-40de-99fc-8e1e66646c2b
ExploitThird Party Advisory
Weaknesses
Could not find any weaknesses
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2022-11-21T11:15:20.963
2 years agoLast modified
2023-11-07T03:51:46.217
1 year ago