Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h5xm-qm7g-wc4p

Опубликовано: 28 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

The Tickera WordPress plugin before 3.4.8.3 does not properly sanitise and escape the Name fields of booked Events before outputting them in the Orders admin dashboard, which could allow unauthenticated users to perform Cross-Site Scripting attacks against admins.

The Tickera WordPress plugin before 3.4.8.3 does not properly sanitise and escape the Name fields of booked Events before outputting them in the Orders admin dashboard, which could allow unauthenticated users to perform Cross-Site Scripting attacks against admins.

EPSS

Процентиль: 94%
0.12126
Средний

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
около 4 лет назад

The Tickera WordPress plugin before 3.4.8.3 does not properly sanitise and escape the Name fields of booked Events before outputting them in the Orders admin dashboard, which could allow unauthenticated users to perform Cross-Site Scripting attacks against admins.

EPSS

Процентиль: 94%
0.12126
Средний

Дефекты

CWE-79