The plugin does not escape its Request and Destination settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Put the following payload in the Request or Destination settings of the plugin: " style=animation-name:rotation onanimationstart=alert(/XSS/)//
fuzzyap1
fuzzyap1
Yes
2022-02-21 (about 4 months ago)
2022-02-21 (about 4 months ago)
2022-04-16 (about 2 months ago)