Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 29 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 29 Oct 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Post Status Notifier Lite and Premium plugins for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 1.11.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
Title | Post Status Notifier Lite and Premium <= 1.11.6 - Reflected Cross-Site Scripting via page | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-29T14:52:54.958Z
Reserved: 2024-10-16T20:06:31.778Z
Link: CVE-2024-10048

Updated: 2024-10-29T14:37:37.432Z

Status : Awaiting Analysis
Published: 2024-10-29T09:15:06.403
Modified: 2024-10-29T14:34:04.427
Link: CVE-2024-10048

No data.

No data.