Описание
The Push Notifications for WordPress by PushAssist WordPress plugin through 3.0.8 does not sanitise and escape various parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | windows-specific |
| devel | not-affected | windows-specific |
| esm-infra-legacy/trusty | not-affected | windows-specific |
| esm-infra/bionic | not-affected | windows-specific |
| esm-infra/focal | not-affected | windows-specific |
| esm-infra/xenial | not-affected | windows-specific |
| focal | not-affected | windows-specific |
| jammy | not-affected | windows-specific |
| kinetic | not-affected | windows-specific |
| lunar | not-affected | windows-specific |
Показывать по
Ссылки на источники
EPSS
6.1 Medium
CVSS3
Связанные уязвимости
The Push Notifications for WordPress by PushAssist WordPress plugin through 3.0.8 does not sanitise and escape various parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
The Push Notifications for WordPress by PushAssist WordPress plugin through 3.0.8 does not sanitise and escape various parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
EPSS
6.1 Medium
CVSS3