The Use-your-Drive | Google Drive plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in file metadata in all versions up to, and including, 3.3.1 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability can be exploited by the lowest authentication level permitted to upload files, including unauthenticated users, once a file upload shortcode is published on a publicly accessible post.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Aug 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wordpress
Wordpress wordpress Wpcloudplugins Wpcloudplugins use-your-drive |
|
Vendors & Products |
Wordpress
Wordpress wordpress Wpcloudplugins Wpcloudplugins use-your-drive |
Tue, 05 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 05 Aug 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Use-your-Drive | Google Drive plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in file metadata in all versions up to, and including, 3.3.1 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability can be exploited by the lowest authentication level permitted to upload files, including unauthenticated users, once a file upload shortcode is published on a publicly accessible post. | |
Title | Use-your-Drive | Google Drive plugin for WordPress <= 3.3.1- Unauthenticated Stored Cross-Site Scripting via File Metadata | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-05T06:39:48.769Z
Updated: 2025-08-05T15:58:15.939Z
Reserved: 2025-07-03T17:35:53.882Z
Link: CVE-2025-7050

Updated: 2025-08-05T15:58:10.535Z

Status : Awaiting Analysis
Published: 2025-08-05T07:15:34.570
Modified: 2025-08-05T14:34:17.327
Link: CVE-2025-7050

No data.