The Awin Data Feed WordPress plugin before 1.8 does not sanitise and escape a parameter before outputting it back via an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/eb40ea5d-a463-4947-9a40-d55911ff50e9 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-07-11T12:56:35
Updated: 2022-08-01T12:48:41
Reserved: 2022-05-30T00:00:00
Link: CVE-2022-1937
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-07-11T13:15:08.853
Modified: 2022-11-05T02:21:50.617
Link: CVE-2022-1937
JSON object: View
Redhat Information
No data.
CWE