The Enhanced Text Widget WordPress plugin before 1.6.6 does not validate and escape some of its Widget options before outputting them back in attributes, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Metrics
Affected Vendors & Products
References
History
Tue, 01 Apr 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Inisev
Inisev enhanced Text Widget |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:inisev:enhanced_text_widget:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Inisev
Inisev enhanced Text Widget |
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Themecheck
Themecheck enhanced Text Widget |
|
CPEs | cpe:2.3:a:themecheck:enhanced_text_widget:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Themecheck
Themecheck enhanced Text Widget |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-20T18:48:42.335Z
Reserved: 2024-01-15T10:56:42.798Z
Link: CVE-2024-0559

Updated: 2024-08-01T18:11:35.226Z

Status : Analyzed
Published: 2024-03-11T18:15:17.743
Modified: 2025-04-01T15:37:13.910
Link: CVE-2024-0559

No data.