The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via folder names in versions up to, and including, 4.18.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with author-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link | Resource |
---|---|
https://devowlio.gitbook.io/changelogs/wordpress-plugins/real-media-library | Release Notes Vendor Advisory |
https://wordpress.org/plugins/real-media-library-lite/ | Product Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/950d71ae-29a1-4b71-b74a-b1a5c9f3326e | Third Party Advisory |
Configurations
Information
Published : 2023-02-02 13:22
Updated : 2023-02-09 13:44
NVD link : CVE-2023-0253
Mitre link : CVE-2023-0253
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
devowl
- wordpress_real_media_library