The Simple Membership WordPress plugin before 4.1.1 does not properly sanitise and escape parameters before outputting them back in AJAX actions, leading to Reflected Cross-Site Scripting
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/96a0a667-9c4b-4ea6-b78a-0681e9a9bbae | Exploit Third Party Advisory |
Configurations
History
17 Jun 2022, 23:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
CPE | cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/96a0a667-9c4b-4ea6-b78a-0681e9a9bbae - Exploit, Third Party Advisory |
13 Jun 2022, 13:26
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-13 13:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-1724
Mitre link : CVE-2022-1724
CVE.ORG link : CVE-2022-1724
JSON object : View
Products Affected
simple-membership-plugin
- simple_membership
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')