The plugin does not sanitise and escape the Download Counter Text settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Put the following payload in the Download Counter Text settings (and tick the Show Download Counter as well): <svg/onload=alert(/XSS/)> The XSS will be triggered in pages/posts where the [shared_files] is embed and has at least one file
Mika
Mika
Yes
2021-10-18 (about 1 years ago)
2021-10-18 (about 1 years ago)
2022-04-15 (about 11 months ago)