Description
The Watu Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘dn’, 'email', 'points', and 'date' parameters in versions up to, and including, 3.3.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Watu Quiz <= 3.3.9 - Reflected Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
|
Mon, 13 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:57:16.419Z
Reserved: 2023-02-22T20:18:41.742Z
Link: CVE-2023-0968
Updated: 2024-08-02T05:32:46.026Z
Status : Modified
Published: 2023-03-03T22:15:09.557
Modified: 2026-04-08T18:17:51.360
Link: CVE-2023-0968
No data.
OpenCVE Enrichment
No data.
Weaknesses