The WPC Smart Wishlist for WooCommerce WordPress plugin before 2.9.9 does not sanitise and escape a parameter before outputting it back in an attribute via an AJAX action, leading to a Reflected Cross-Site Scripting issue.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/6781033a-f166-4198-874f-3e142854daf7 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/6781033a-f166-4198-874f-3e142854daf7 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/6781033a-f166-4198-874f-3e142854daf7 - Exploit, Third Party Advisory |
Information
Published : 2022-05-16 15:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1465
Mitre link : CVE-2022-1465
CVE.ORG link : CVE-2022-1465
JSON object : View
Products Affected
wpclever
- wpc_smart_wishlist_for_woocommerce
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')