Description
WordPress Plugin LIQUID SPEECH BALLOON is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. WordPress Plugin LIQUID SPEECH BALLOON version 1.0.6 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.0.7 or latest
References
https://gist.github.com/rezaduty/18afedba24bb1e5835010bd2de67cece
https://plugins.svn.wordpress.org/liquid-speech-balloon/trunk/readme.txt
Related Vulnerabilities
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2006-4343)
WordPress Plugin Appointment Booking Calendar CSV Injection (1.3.34)
WordPress Plugin Easy Media Download Cross-Site Scripting (1.1.6)
WordPress 'wp-login.php' HTTP Response Splitting Vulnerability (1.2)
Oracle Database Server CVE-2023-22075 Vulnerability (CVE-2023-22075)