The MediaElement.js WordPress plugin through 4.2.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high-privilege users such as admins.
History

Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mediaelementjs
Mediaelementjs mediaelement.js
CPEs cpe:2.3:a:mediaelement.js_project:mediaelement.js:*:*:*:*:*:wordpress:*:* cpe:2.3:a:mediaelementjs:mediaelement.js:*:*:*:*:*:wordpress:*:*
Vendors & Products Mediaelement.js Project
Mediaelement.js Project mediaelement.js
Mediaelementjs
Mediaelementjs mediaelement.js

Thu, 27 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2023-01-30T20:31:47.064Z

Updated: 2025-03-27T19:24:11.989Z

Reserved: 2022-12-23T16:31:50.044Z

Link: CVE-2022-4699

cve-icon Vulnrichment

Updated: 2024-08-03T01:48:39.997Z

cve-icon NVD

Status : Analyzed

Published: 2023-01-30T21:15:11.907

Modified: 2025-04-21T13:58:19.353

Link: CVE-2022-4699

cve-icon Redhat

No data.