A stored XSS vulnerability in the Visualizer plugin 3.3.0 for WordPress allows an unauthenticated attacker to execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. This occurs because classes/Visualizer/Gutenberg/Block.php registers wp-json/visualizer/v1/update-chart with no access control, and classes/Visualizer/Render/Page/Data.php lacks output sanitization.
References
Link | Resource |
---|---|
https://wpvulndb.com/vulnerabilities/9893 | Exploit Third Party Advisory |
https://wordpress.org/plugins/visualizer/#developers | Product Release Notes |
https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-10-03 12:15
Updated : 2019-10-09 12:50
NVD link : CVE-2019-16931
Mitre link : CVE-2019-16931
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
themeisle
- visualizer