The plugin does not sanitise or validate the parameters from its shortcode, allowing users with a role as low as contributor to set Cross-Site Scripting payload in them which will be triggered in the page/s with the embed malicious shortcode
Log in as contributor and add the following shortcode in a post [timeline username='" onmousemove="alert(/XSS/)" data-xss="'] Then view the post and move the mouse over the generated link to trigger the XSS
Michał Lipiński
Yes
2021-09-20 (about 9 months ago)
2021-09-20 (about 9 months ago)
2022-04-08 (about 2 months ago)