Multiple cross-site scripting (XSS) vulnerabilities in the Activity Log plugin before 2.4.1 for WordPress allow remote attackers to inject arbitrary JavaScript or HTML via a title that is not escaped.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/pojome/activity-log/commit/950c46b2290c991187ff3471640e9688b16908fb | third party advisory patch |
https://plugins.trac.wordpress.org/changeset/1836276 | third party advisory patch |
https://www.exploit-db.com/exploits/44437/ | exploit vdb entry third party advisory |
https://github.com/pojome/activity-log/commit/e7bcd12fcb0add82bed762a971f427a360664bd9 | release notes third party advisory patch |
https://wordpress.org/plugins/aryo-activity-log/#developers | third party advisory release notes |