漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
Simple Download Monitor < 3.9.5 - Contributor+ Stored Cross-Site Scripting via File Thumbnail
漏洞信息
The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the "File Thumbnail" post meta before outputting it in some pages, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. Given the that XSS is triggered even when the Download is in a review state, contributor could make JavaScript code execute in a context of a reviewer such as admin and make them create a rogue admin account, or install a malicious plugin
漏洞信息
N/A
漏洞
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞
WordPress 插件跨站脚本漏洞
漏洞信息
WordPress是Wordpress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress 插件是WordPress开源的一个应用插件。 WordPress plugin 存在跨站脚本漏洞,该漏洞源于 The Simple Download Monitor 插件在将其输出到某些页面之前不会转义 File Thumbnail 帖子元数据,这可能允许具有低至贡献者角色的用户执行存储跨站点脚本攻击。 鉴于即使下载处于审查状态也会触发 XSS,贡献
漏洞信息
N/A
漏洞
N/A