The Location Weather WordPress plugin before 1.3.4 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Location_weather | Shapedplugin | * | 1.3.4 (excluding) |