The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e | Exploit Third Party Advisory |
Configurations
History
27 Jun 2023, 09:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:themify:conditional_menus:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | (MISC) https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e - Exploit, Third Party Advisory |
19 Jun 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-19 11:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-2654
Mitre link : CVE-2023-2654
CVE.ORG link : CVE-2023-2654
JSON object : View
Products Affected
themify
- conditional_menus
CWE
No CWE.