Описание
The Bannerlid WordPress plugin through 1.1.0 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as administrators
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.1.0 (включая)
cpe:2.3:a:web_lid:bannerlid:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 38%
0.0017
Низкий
5.5 Medium
CVSS3
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 5.5
github
почти 2 года назад
The Bannerlid WordPress plugin through 1.1.0 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as administrators
EPSS
Процентиль: 38%
0.0017
Низкий
5.5 Medium
CVSS3
Дефекты
CWE-79