The Bonus for Woo WordPress plugin before 5.8.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/ee1824e8-09a6-4763-b65e-03701dc3e171 | Exploit Product Third Party Advisory |
https://wpscan.com/vulnerability/ee1824e8-09a6-4763-b65e-03701dc3e171 | Exploit Product Third Party Advisory |
Configurations
History
21 Nov 2024, 08:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/ee1824e8-09a6-4763-b65e-03701dc3e171 - Exploit, Product, Third Party Advisory |
24 Nov 2023, 18:49
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-20 19:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5140
Mitre link : CVE-2023-5140
CVE.ORG link : CVE-2023-5140
JSON object : View
Products Affected
computy
- bonus_for_woo
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')