The Font Awesome WordPress plugin before 4.3.2 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003 | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003 | Exploit Third Party Advisory |
Configurations
History
07 Apr 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003 - Exploit, Third Party Advisory |
07 Nov 2023, 03:57
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
Information
Published : 2023-01-16 16:15
Updated : 2025-04-07 17:15
NVD link : CVE-2022-4478
Mitre link : CVE-2022-4478
JSON object : View
Products Affected
fontawesome
- font_awesome
CWE
No CWE.
