The MediaElement.js WordPress plugin through 4.2.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high-privilege users such as admins.
Metrics
Affected Vendors & Products
References
History
Mon, 21 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mediaelementjs
Mediaelementjs mediaelement.js |
|
CPEs | cpe:2.3:a:mediaelementjs:mediaelement.js:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Mediaelement.js Project
Mediaelement.js Project mediaelement.js |
Mediaelementjs
Mediaelementjs mediaelement.js |
Thu, 27 Mar 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: WPScan
Published: 2023-01-30T20:31:47.064Z
Updated: 2025-03-27T19:24:11.989Z
Reserved: 2022-12-23T16:31:50.044Z
Link: CVE-2022-4699

Updated: 2024-08-03T01:48:39.997Z

Status : Analyzed
Published: 2023-01-30T21:15:11.907
Modified: 2025-04-21T13:58:19.353
Link: CVE-2022-4699

No data.