The plugin does not properly sanitize its “Simple Banner Text” Settings allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Put the following payloads in the “Simple Banner Text” settings of the plugin: [Firefox](<jav ascript:alert(document.cookie)>) ript>alert(/XSS/)ipt> Then access the frontend to trigger the XSS
CPE | Name | Operator | Version |
---|---|---|---|
simple-banner | lt | 2.12.0 |