The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:59
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e - Exploit, Third Party Advisory | 
27 Jun 2023, 09:09
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:themify:conditional_menus:*:*:*:*:*:wordpress:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.1 | 
19 Jun 2023, 11:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-06-19 11:15
Updated : 2024-12-12 01:20
NVD link : CVE-2023-2654
Mitre link : CVE-2023-2654
CVE.ORG link : CVE-2023-2654
JSON object : View
Products Affected
                themify
- conditional_menus
CWE
                No CWE.
