The plugin does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when unfiltered_html is disallowed
Put the following payload in any of the plugin's text field settings (such as Title , Title font-size etc): "><svg onload=prompt(1)// Then save and reload the settings to trigger the XSS. The XSS will also trigger in pages/posts where the plugin's shortcode is embed
Mika
Mika
Yes
2022-04-04 (about 3 months ago)
2022-04-04 (about 3 months ago)
2022-04-09 (about 2 months ago)