First published: Mon May 13 2019(Updated: )
Multiple stored cross-site scripting (XSS) in the MyThemeShop Launcher plugin 1.0.8 for WordPress allow remote authenticated users to inject arbitrary web script or HTML via fields as follows: (1) Title, (2) Favicon, (3) Meta Description, (4) Subscribe Form (Name field label, Last name field label, Email field label), (5) Contact Form (Name field label and Email field label), and (6) Social Links (Facebook Page URL, Twitter Page URL, Instagram Page URL, YouTube Page URL, Linkedin Page URL, Google+ Page URL, RSS URL).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MyThemeShop Launcher | =1.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-7411.
The severity of CVE-2019-7411 is medium with a CVSS score of 5.4.
The MyThemeShop Launcher plugin 1.0.8 for WordPress is affected by CVE-2019-7411.
Remote authenticated users can exploit CVE-2019-7411 by injecting arbitrary web script or HTML in fields such as Title, Favicon, Meta Description, and Subscribe Form.
Yes, you can find references for CVE-2019-7411 at the following links: [Link 1](https://metamorfosec.com/Files/Advisories/METS-2019-002-Multiple_Stored_XSS_Vulnerabilities_in_the_MyThemeShop_Launcher_plugin_v1.0.8_for_WordPress.txt) and [Link 2](https://wpvulndb.com/vulnerabilities/9275).