ElegantThemes (divi, extra, divi-builder) - Authenticated Stored Cross-Site Scripting (XSS)



Description
A privilege escalation vulnerability was discovered that could allow low level users, such as Authors, to use unfiltered HTML inside of post content when using the Divi Builder. Using such code in posts is typically reserved for admins.

Affects Plugin

fixed in version 2.17.3

Affects Themes

fixed in version 3.17.3
fixed in version 2.17.3

References

URL https://us7.campaign-archive.com/?u=9ae7aa91c578052b052b864d6&id=a9763c15f2
URL https://divinotes.com/divi-changelog/
URL https://divinotes.com/extra-changelog/
URL https://www.elegantthemes.com/api/changelog/divi-builder.txt
URL https://www.elegantthemes.com/api/changelog/divi.txt
URL https://www.elegantthemes.com/api/changelog/extra.txt

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter Ryan Dewhurst
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 4653
Verified No
WPVDB ID 9140

Timeline

Publicly Published 2018-10-30 (22 days ago)
Added 2018-10-31 (21 days ago)
Last Updated 2018-10-31 (20 days ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.