The FlatPM WordPress plugin before 3.0.13 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a - Exploit, Third Party Advisory |
27 Feb 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The FlatPM WordPress plugin before 3.0.13 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin |
14 Dec 2022, 21:23
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-12 18:15
Updated : 2025-04-22 15:16
NVD link : CVE-2022-3934
Mitre link : CVE-2022-3934
CVE.ORG link : CVE-2022-3934
JSON object : View
Products Affected
mehanoid
- flat_pm
CWE
No CWE.