- 漏洞ID:
- 漏洞类型:跨站脚本
- 发布日期:2026-01-28 00:00:00
- 更新时间:2026-01-29 00:00:00
- CVE编号:CVE-2025-9082
- CNNVD-ID:CNNVD-202601-4814
- 漏洞平台:WordPress
- CVSS评分:
暂无
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin WPBITS Addons For Elementor 1.8及之前版本存在跨站脚本漏洞,该漏洞源于启用动态内容时对多个部件参数输入清理和输出转义不足,可能导致存储型跨站脚本攻击。
来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/image_compare.php#L607 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/text_rotator.php#L369 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/tooltip.php#L860 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442812%40wpbits-addons-for-elementor&new=3442812%40wpbits-addons-for-elementor&sfp_email=&sfph_mail= 来源:www.wordfence.com 链接:https://www.wordfence.com/threat-intel/vulnerabilities/id/99b47856-502e-4e9d-b0ea-62c57509b46a?source=cve
返回




微信扫码关注公众号







