The Widget Settings Importer/Exporter Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the wp_ajax_import_widget_dataparameter AJAX action in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with subscriber-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link | Resource |
---|---|
https://www.wordfence.com/blog/2020/04/unpatched-high-severity-vulnerability-in-widget-settings-importer-exporter-plugin/ | Exploit Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/e14f0fc6-fca4-4dd7-8f7b-ed5ed535c9af?source=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-12-23 10:15
Updated : 2023-12-29 06:22
NVD link : CVE-2020-36769
Mitre link : CVE-2020-36769
CVE.ORG link : CVE-2020-36769
JSON object : View
Products Affected
porternovelli
- widget_settings_importer\/exporter
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')