The WP-Ban WordPress plugin before 1.69.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/d0cf24be-df87-4e1f-aae7-e9684c88e7db | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/d0cf24be-df87-4e1f-aae7-e9684c88e7db | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:34
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://wpscan.com/vulnerability/d0cf24be-df87-4e1f-aae7-e9684c88e7db - Exploit, Third Party Advisory | |
| Summary | 
 | 
07 Nov 2023, 03:57
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | 
Information
                Published : 2023-01-02 22:15
Updated : 2025-04-10 19:15
NVD link : CVE-2022-4260
Mitre link : CVE-2022-4260
CVE.ORG link : CVE-2022-4260
JSON object : View
Products Affected
                wp-ban_project
- wp-ban
CWE
                No CWE.
