Description
The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34120 | The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin |
References
History
Wed, 11 Dec 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-12-11T20:39:39.099Z
Reserved: 2023-05-11T11:39:46.840Z
Link: CVE-2023-2654
Updated: 2024-08-02T06:26:09.906Z
Status : Modified
Published: 2023-06-19T11:15:10.380
Modified: 2024-12-12T01:20:35.933
Link: CVE-2023-2654
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD