Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2r3g-9rm8-7fv3

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Prismatic WordPress plugin before 2.8 does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator

The Prismatic WordPress plugin before 2.8 does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator

EPSS

Процентиль: 94%
0.13254
Средний

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
больше 4 лет назад

The Prismatic WordPress plugin before 2.8 does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator

EPSS

Процентиль: 94%
0.13254
Средний

Дефекты

CWE-79