Описание
The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.2.1 (исключая)
cpe:2.3:a:themify:conditional_menus:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 33%
0.00128
Низкий
6.1 Medium
CVSS3
Дефекты
Связанные уязвимости
CVSS3: 6.1
github
больше 2 лет назад
The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
EPSS
Процентиль: 33%
0.00128
Низкий
6.1 Medium
CVSS3