The RapidExpCart WordPress plugin through 1.0 does not sanitize and escape the url parameter in the rapidexpcart endpoint before storing it and outputting it back in the page, leading to a Stored Cross-Site Scripting vulnerability which could be used against high-privilege users such as admin, furthermore lack of csrf protection means an attacker can trick a logged in admin to perform the attack by submitting a hidden form.
References
Configurations
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e - Exploit |
23 May 2023, 15:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | (MISC) https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e - Exploit | |
CPE | cpe:2.3:a:rapidexp:rapidexpcart:*:*:*:*:*:wordpress:*:* |
15 May 2023, 13:26
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-15 13:15
Updated : 2025-01-24 21:15
NVD link : CVE-2023-0520
Mitre link : CVE-2023-0520
CVE.ORG link : CVE-2023-0520
JSON object : View
Products Affected
rapidexp
- rapidexpcart
CWE
No CWE.