First published: Thu Oct 03 2019(Updated: )
A stored XSS vulnerability in the Visualizer plugin 3.3.0 for WordPress allows an unauthenticated attacker to execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. This occurs because classes/Visualizer/Gutenberg/Block.php registers wp-json/visualizer/v1/update-chart with no access control, and classes/Visualizer/Render/Page/Data.php lacks output sanitization.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Themeisle Visualizer | <=3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16931 is a stored XSS vulnerability in the Visualizer plugin 3.3.0 for WordPress that allows an attacker to execute arbitrary JavaScript when editing the chart via the admin dashboard.
CVE-2019-16931 affects WordPress installations that have the Visualizer plugin version 3.3.0 installed.
The severity of CVE-2019-16931 is medium, with a CVSS score of 6.1.
You are affected by CVE-2019-16931 if you have the Visualizer plugin version 3.3.0 installed on your WordPress site.
To fix CVE-2019-16931, update the Visualizer plugin to a version that is not affected by the vulnerability.