The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitise and escape the iowd_tabs_active parameter before rendering it in the plugin admin panel, leading to a reflected Cross-Site Scripting vulnerability, allowing an attacker to trick a logged in admin to execute arbitrary javascript by clicking a link.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/936fd93a-428d-4744-a4fc-c8da78dcbe78 | Exploit Third Party Advisory |
Configurations
History
22 Aug 2023, 16:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:10web:image_optimizer:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | (MISC) https://wpscan.com/vulnerability/936fd93a-428d-4744-a4fc-c8da78dcbe78 - Exploit, Third Party Advisory |
16 Aug 2023, 12:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-16 12:15
Updated : 2024-02-05 00:01
NVD link : CVE-2023-2122
Mitre link : CVE-2023-2122
CVE.ORG link : CVE-2023-2122
JSON object : View
Products Affected
10web
- image_optimizer
CWE
No CWE.