CVE-2023-0099

The Simple URLs WordPress plugin before 115 does not sanitise and escape some parameters before outputting them back in some pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getlasso:simple_urls:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:36

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html - () http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html -
References () https://wpscan.com/vulnerability/fd50f2d6-e420-4220-b485-73f33227e8f8 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/fd50f2d6-e420-4220-b485-73f33227e8f8 - Exploit, Third Party Advisory

05 Feb 2024, 17:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html -

07 Nov 2023, 03:59

Type Values Removed Values Added
CWE CWE-79

Information

Published : 2023-02-13 15:15

Updated : 2024-11-21 07:36


NVD link : CVE-2023-0099

Mitre link : CVE-2023-0099

CVE.ORG link : CVE-2023-0099


JSON object : View

Products Affected

getlasso

  • simple_urls
CWE

No CWE.