The Cloud Manager WordPress plugin through 1.0 does not sanitise and escape the query param ricerca before outputting it in an admin panel, allowing unauthenticated attackers to trick a logged in admin to trigger a XSS payload by clicking a link.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/a356fea0-f143-4736-b2b2-c545c525335c | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/a356fea0-f143-4736-b2b2-c545c525335c | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/a356fea0-f143-4736-b2b2-c545c525335c - Exploit, Third Party Advisory |
15 May 2023, 16:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CPE | cpe:2.3:a:cloud_manager_project:cloud_manager:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/a356fea0-f143-4736-b2b2-c545c525335c - Exploit, Third Party Advisory |
08 May 2023, 14:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-08 14:15
Updated : 2024-11-21 07:37
NVD link : CVE-2023-0421
Mitre link : CVE-2023-0421
CVE.ORG link : CVE-2023-0421
JSON object : View
Products Affected
cloud_manager_project
- cloud_manager
CWE
No CWE.