The Judge.me Product Reviews for WooCommerce WordPress plugin before 1.3.21 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/a1d0d131-c773-487e-88f8-e3d63936fbbb | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/a1d0d131-c773-487e-88f8-e3d63936fbbb | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/a1d0d131-c773-487e-88f8-e3d63936fbbb - Exploit, Third Party Advisory |
23 Feb 2023, 04:53
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-13 15:15
Updated : 2025-03-21 20:15
NVD link : CVE-2023-0061
Mitre link : CVE-2023-0061
CVE.ORG link : CVE-2023-0061
JSON object : View
Products Affected
judge
- product_reviews_for_woocommerce
CWE
No CWE.