The PDF Viewer WordPress plugin before 1.0.0 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/2d9ae43b-75a7-4fcc-bce3-d9e9d7a97ec0 | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/2d9ae43b-75a7-4fcc-bce3-d9e9d7a97ec0 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wpscan.com/vulnerability/2d9ae43b-75a7-4fcc-bce3-d9e9d7a97ec0 - Exploit, Third Party Advisory | |
| Summary |
|
07 Nov 2023, 03:59
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
Information
Published : 2023-01-30 21:15
Updated : 2025-03-27 16:15
NVD link : CVE-2023-0033
Mitre link : CVE-2023-0033
CVE.ORG link : CVE-2023-0033
JSON object : View
Products Affected
pdf_viewer_project
- pdf_viewer
CWE
No CWE.
