The plugin does not sanitise or validate the parameters from its shortcode, allowing users with a role as low as contributor to set Cross-Site Scripting payload in them which will be triggered in the page/s with the embed malicious shortcode
Log in as contributor and add the following shortcode in a post [ytplayer id='" onmouseover="alert(/XSS/)"'] Then view the post and move the mouse over the embed YT player to trigger the XSS
Michał Lipiński
Yes
2021-09-22 (about 9 months ago)
2021-09-22 (about 9 months ago)
2021-09-22 (about 9 months ago)