Vulnerability Description
Multiple stored cross-site scripting (XSS) in the MyThemeShop Launcher plugin 1.0.8 for WordPress allow remote authenticated users to inject arbitrary web script or HTML via fields as follows: (1) Title, (2) Favicon, (3) Meta Description, (4) Subscribe Form (Name field label, Last name field label, Email field label), (5) Contact Form (Name field label and Email field label), and (6) Social Links (Facebook Page URL, Twitter Page URL, Instagram Page URL, YouTube Page URL, Linkedin Page URL, Google+ Page URL, RSS URL).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mythemeshop | Launcher | 1.0.8 |
Related Weaknesses (CWE)
References
- https://metamorfosec.com/Files/Advisories/METS-2019-002-Multiple_Stored_XSS_VulnExploitThird Party Advisory
- https://wpvulndb.com/vulnerabilities/9275
- https://metamorfosec.com/Files/Advisories/METS-2019-002-Multiple_Stored_XSS_VulnExploitThird Party Advisory
- https://wpvulndb.com/vulnerabilities/9275
FAQ
What is CVE-2019-7411?
CVE-2019-7411 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Multiple stored cross-site scripting (XSS) in the MyThemeShop Launcher plugin 1.0.8 for WordPress allow remote authenticated users to inject arbitrary web script or HTML via fields as follows: (1) Tit...
How severe is CVE-2019-7411?
CVE-2019-7411 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7411?
Check the references section above for vendor advisories and patch information. Affected products include: Mythemeshop Launcher.