漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Menu Image, Icons made easy < 3.0.8 - Subscriber+ Stored Cross-Site Scripting
Vulnerability Description
The Menu Image, Icons made easy WordPress plugin before 3.0.6 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any authenticate users, such as subscriber can update the settings or arbitrary menu and put Cross-Site Scripting payloads in them which will be triggered in the related menu in the frontend
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
WordPress plugin Menu Image, Icons made easy 跨站脚本漏洞
Vulnerability Description
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Menu Image, Icons made easy 3.0.6之前版本存在跨站脚本漏洞,该漏洞源于保存菜单设置时没有授权和 CSRF 检查,也不会验证、清理和转义它们。 攻击者可以更新设置或任意菜单,并将跨站点脚本有效负载
CVSS Information
N/A
Vulnerability Type
N/A