Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 15 May 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Antongorodezkiy
Antongorodezkiy yadisk Files |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:antongorodezkiy:yadisk_files:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Antongorodezkiy
Antongorodezkiy yadisk Files |
Mon, 25 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yadisk Files
Yadisk Files yadisk Files |
|
| CPEs | cpe:2.3:a:yadisk_files:yadisk_files:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yadisk Files
Yadisk Files yadisk Files |
|
| Metrics |
cvssV3_1
|
Mon, 25 Nov 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | YaDisk Files <= 1.2.5 - Contributor+ Stored XSS via Shortcode |
Mon, 25 Nov 2024 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The YaDisk Files WordPress plugin through 1.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-01-09T21:27:05.999Z
Reserved: 2024-11-01T19:51:27.086Z
Link: CVE-2024-10709
Updated: 2024-11-25T20:35:23.881Z
Status : Modified
Published: 2024-11-25T06:15:04.573
Modified: 2026-01-09T22:15:57.847
Link: CVE-2024-10709
No data.
OpenCVE Enrichment
No data.