The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via folder names in versions up to, and including, 4.18.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with author-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link | Resource |
---|---|
https://devowlio.gitbook.io/changelogs/wordpress-plugins/real-media-library | Release Notes Vendor Advisory |
https://wordpress.org/plugins/real-media-library-lite/ | Product Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/950d71ae-29a1-4b71-b74a-b1a5c9f3326e | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-02-02 21:22
Updated : 2023-11-07 03:59
NVD link : CVE-2023-0253
Mitre link : CVE-2023-0253
CVE.ORG link : CVE-2023-0253
JSON object : View
Products Affected
devowl
- wordpress_real_media_library
CWE
No CWE.