The Pretty Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting via various IP headers as well as the referer header in versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping in the track_link function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
No history.
Information
Published : 2023-06-07 02:15
Updated : 2023-11-07 03:09
NVD link : CVE-2019-25147
Mitre link : CVE-2019-25147
CVE.ORG link : CVE-2019-25147
JSON object : View
Products Affected
prettylinks
- pretty_links
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')