When visiting a site running Web-Stat < 1.4.0, the "wts_web_stat_load_init" function used the visitor’s browser to send an XMLHttpRequest request to https://wts2.one/ajax.htm?action=lookup_WP_account.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/e7326903-1552-4934-a611-fc0b43236d60 | Third Party Advisory |
https://wpscan.com/vulnerability/e7326903-1552-4934-a611-fc0b43236d60 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/e7326903-1552-4934-a611-fc0b43236d60 - Third Party Advisory |
07 Nov 2023, 03:31
Type | Values Removed | Values Added |
---|---|---|
Summary | When visiting a site running Web-Stat < 1.4.0, the "wts_web_stat_load_init" function used the visitor’s browser to send an XMLHttpRequest request to https://wts2.one/ajax.htm?action=lookup_WP_account. |
Information
Published : 2021-04-05 19:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24167
Mitre link : CVE-2021-24167
CVE.ORG link : CVE-2021-24167
JSON object : View
Products Affected
web-stat
- web-stat
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor