Description
WordPress Plugin MediaElement.js-HTML5 Video & Audio Player is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. WordPress Plugin MediaElement.js-HTML5 Video & Audio Player version 4.2.8 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
https://sploitus.com/exploit?id=WPEX-ID:E57F38D9-889A-4F82-B20D-3676CCF9C6F9
https://wordpress.org/plugins/media-element-html5-video-and-audio-player/#description
Related Vulnerabilities
PHP Deserialization of Untrusted Data Vulnerability (CVE-2007-1701)
WordPress Plugin Genesis Simple Defaults Arbitrary File Upload (1.0.0)
MySQL CVE-2024-21209 Vulnerability (CVE-2024-21209)
Drupal Configuration Vulnerability (CVE-2008-6171)
WordPress Plugin Product Reviews Import Export for WooCommerce CSV Injection (1.4.8)