The URL Params WordPress plugin before 2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/4f6197b6-6d4c-4986-b54c-453b17e94812 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/4f6197b6-6d4c-4986-b54c-453b17e94812 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/4f6197b6-6d4c-4986-b54c-453b17e94812 - Exploit, Third Party Advisory |
22 Aug 2023, 13:07
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CPE | cpe:2.3:a:asandia:url_params:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/4f6197b6-6d4c-4986-b54c-453b17e94812 - Exploit, Third Party Advisory |
16 Aug 2023, 12:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-16 12:15
Updated : 2024-11-21 07:36
NVD link : CVE-2023-0274
Mitre link : CVE-2023-0274
CVE.ORG link : CVE-2023-0274
JSON object : View
Products Affected
asandia
- url_params
CWE
No CWE.