Description
The duoFAQ - Responsive, Flat, Simple FAQ WordPess plugin is vulnerable to Reflected Cross-Site Scripting via the msg parameter found in the ~/duogeek/duogeek-panel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.8.
No analysis available yet.
Remediation
Vendor Solution
Uninstall plugin from WordPress site.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-25680 | The duoFAQ - Responsive, Flat, Simple FAQ WordPess plugin is vulnerable to Reflected Cross-Site Scripting via the msg parameter found in the ~/duogeek/duogeek-panel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.8. |
References
History
Thu, 13 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-13T20:47:45.352Z
Reserved: 2021-08-20T00:00:00.000Z
Link: CVE-2021-39319
Updated: 2024-08-04T02:06:41.560Z
Status : Modified
Published: 2021-12-14T16:15:08.900
Modified: 2024-11-21T06:19:13.907
Link: CVE-2021-39319
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD