The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2023-06-19T10:52:53.455Z
Updated: 2023-06-19T10:52:53.455Z
Reserved: 2023-05-11T11:39:46.840Z
Link: CVE-2023-2654
JSON object: View
NVD Information
Status : Modified
Published: 2023-06-19T11:15:10.380
Modified: 2023-11-07T04:13:03.127
Link: CVE-2023-2654
JSON object: View
Redhat Information
No data.
CWE
No CWE.