Description
The Tiempo.com WordPress plugin through 0.1.2 does not sanitise and escape the page parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33778 | The Tiempo.com WordPress plugin through 0.1.2 does not sanitise and escape the page parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin |
References
History
Tue, 08 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-10-08T19:10:31.209Z
Reserved: 2023-04-25T07:33:50.107Z
Link: CVE-2023-2272
Updated: 2024-08-02T06:19:14.561Z
Status : Modified
Published: 2023-08-16T12:15:13.053
Modified: 2024-11-21T07:58:17.170
Link: CVE-2023-2272
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD