Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wj9q-3vrf-hwq5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The SMS OVH WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the position parameter found in the ~/sms-ovh-sent.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.

The SMS OVH WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the position parameter found in the ~/sms-ovh-sent.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.

EPSS

Процентиль: 43%
0.0021
Низкий

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
больше 4 лет назад

The SMS OVH WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the position parameter found in the ~/sms-ovh-sent.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.

EPSS

Процентиль: 43%
0.0021
Низкий

Дефекты

CWE-79