Vulnerabilities and security researches forsimple-banner simple-banner
Direction: ascendingJun 07, 2024
Simple Banner – An easy to use Banner/Bar/Notification/Announcement for the top or bottom of your website # CVE-2021-24574
- CVE, Research URL
- Date
- Aug 23, 2021
- Research Description
- The Simple Banner WordPress plugin before 2.10.4 does not sanitise and escape one of its settings, allowing high privilege users such as admin to use Cross-Site Scripting payload even when the unfiltered_html capability is disallowed.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Banner – An easy to use Banner/Bar/Notification/Announcement for the top or bottom of your website # CVE-2022-2515
- CVE, Research URL
- Date
- Sep 06, 2022
- Research Description
- The Simple Banner plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `pro_version_activation_code` parameter in versions up to, and including, 2.11.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, including those without administrative capabilities when access is granted to those users, to inject arbitrary web scripts in page that will execute whenever a user role having access to "Simple Banner" accesses the plugin's settings.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Banner – An easy to use Banner/Bar/Notification/Announcement for the top or bottom of your website # CVE-2022-0446
- CVE, Research URL
- Date
- Aug 22, 2022
- Research Description
- The Simple Banner WordPress plugin before 2.12.0 does not properly sanitize its "Simple Banner Text" Settings allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Mar 26, 2025
Simple Banner – An easy to use Banner/Bar/Notification/Announcement for the top or bottom of your website # CVE-2024-12769
- CVE, Research URL
- Date
- Mar 25, 2025
- Research Description
- The Simple Banner WordPress plugin before 3.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Apr 05, 2025
Simple Banner – An easy to use Banner/Bar/Notification/Announcement for the top or bottom of your website # CVE-2024-13898
- CVE, Research URL
- Date
- Apr 04, 2025
- Research Description
- The Simple Banner – Easily add multiple Banners/Bars/Notifications/Announcements to the top or bottom of your website plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable