The Product Catalog Feed by PixelYourSite WordPress plugin before 2.1.1 does not sanitise and escape the edit parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrators.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/55b28fa6-a54f-4365-9d59-f9e331c1e11b | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/55b28fa6-a54f-4365-9d59-f9e331c1e11b | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/55b28fa6-a54f-4365-9d59-f9e331c1e11b - Exploit, Third Party Advisory |
07 Nov 2023, 04:05
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-05-02 08:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1804
Mitre link : CVE-2023-1804
CVE.ORG link : CVE-2023-1804
JSON object : View
Products Affected
pixelyoursite
- product_catalog_feed
CWE
No CWE.