The YaDisk Files WordPress plugin through 1.2.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Metrics
Affected Vendors & Products
References
History
Mon, 25 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Yadisk Files
Yadisk Files yadisk Files |
|
CPEs | cpe:2.3:a:yadisk_files:yadisk_files:*:*:*:*:*:*:*:* | |
Vendors & Products |
Yadisk Files
Yadisk Files yadisk Files |
|
Metrics |
cvssV3_1
|
Mon, 25 Nov 2024 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | YaDisk Files <= 1.2.5 - Admin+ Stored XSS |
Mon, 25 Nov 2024 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The YaDisk Files WordPress plugin through 1.2.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | |
References |
|

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-11-25T16:59:09.523Z
Reserved: 2024-11-01T19:54:45.277Z
Link: CVE-2024-10710

Updated: 2024-11-25T16:56:37.240Z

Status : Received
Published: 2024-11-25T06:15:05.960
Modified: 2024-11-25T17:15:11.747
Link: CVE-2024-10710

No data.