The Header Footer Code Manager plugin <= 1.1.16 for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) via the $_REQUEST['page'] parameter.
{"wordfence": [{"lastseen": "2022-03-04T01:08:41", "description": "On February 15, 2022, the Wordfence Threat Intelligence team responsibly disclosed a reflected Cross-Site Scripting (XSS) vulnerability in Header Footer Code Manager, a WordPress plugin with over 300,000 installations.\n\nThe plugin publisher quickly acknowledged our initial contact and we sent the full disclosure details the same day, on February 15, 2022. A patched version, 1.1.17, was implemented a few days later and made available on February 18, 2022.\n\n[Wordfence Premium](<https://www.wordfence.com/products/wordfence-premium/>), [Wordfence Care](<https://www.wordfence.com/products/wordfence-care/>), and [Wordfence Response](<https://www.wordfence.com/products/wordfence-response/>) customers received a firewall rule to protect against this vulnerability on February 15, 2022. Sites still running the free version of Wordfence are partially protected against this exploit by our built-in XSS rule, but will receive full protection 30 days later, on March 17, 2022.\n\n**Description:** Reflected Cross-Site Scripting \n**Affected Plugin:** [Header Footer Code Manager](<https://wordpress.org/plugins/header-footer-code-manager/>) \n**Plugin Slug:** header-footer-code-manager \n**Plugin Developer:** 99robots \n**Affected Versions:** <= 1.1.16 \n**CVE ID:** CVE-2022-0710 \n**CVSS Score:** 6.1 (Medium) \n**CVSS Vector:** [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N>) \n**Researcher/s:** Ramuel Gall \n**Fully Patched Version:** 1.1.17\n\nHeader Footer Code Manager is a WordPress plugin designed to allow administrators to add code snippets to the header or footer of a website. One of the admin panel pages added by the plugin allows administrators to view a list of code snippets that had been added to the site, which included links to edit or delete these existing code snippets. The plugin\u2019s column_name function used the `$_REQUEST[\u2018page\u2019]` parameter to construct this link.\n\nWordPress uses the value of the `$_GET[\u2018page\u2019]` parameter in order to determine which page the user is currently visiting, and will block unauthorized users if they\u2019re not allowed to access the current page set in `$_GET[\u2018page\u2019]`. This means that `$_REQUEST[\u2018page\u2019]` might be expected to just contain the admin page used to display the list of code snippets, `hfcm-list`. However, due to a quirk of how PHP handles superglobal variables, `$_REQUEST` parameters can be overloaded.\n\nPHP populates the `$_REQUEST` superglobal variable from `$_GET`, `$_POST`, and `$_COOKIE`. That means that normally, if a `$_GET[\u2018page\u2019]` parameter is sent, `$_REQUEST[\u2018page\u2019]` will be populated with the value of `$_GET[\u2018page\u2019]`. In most PHP configurations, however, the `request_order` (or `variables_order` if `request_order` is not set) means that if a request is sent with both a `$_GET[\u2018page\u2019]` parameter _and_ a `$_POST[\u2018page\u2019]` parameter, the value of `$_REQUEST[\u2018page\u2019]` is set to the value of `$_POST[\u2018page\u2019]`.\n\nThe upshot is that this can be used to execute JavaScript in the browser of a logged-in administrator, for instance, by tricking them into visiting a self-submitting form that sends a POST request to e.g. hxxps://victimsite.site/wp-admin/admin.php?page=hfcm-list, with the `$_POST[\u2018page\u2019]` parameter set to malicious JavaScript.\n\nThe `$_GET[\u2018page\u2019]` parameter means that WordPress will route the victim to the correct page, and then the value of `$_REQUEST[\u2018page\u2019]` (which in nearly all configurations will be set to the value of `$_POST[\u2018page\u2019]`) will get echoed out onto the page.\n\nMost XSS can be used to perform actions using an administrator\u2019s session, which includes the ability to create malicious administrators and in some cases add backdoors. Additionally, this particular plugin is used to add code to a site, so an attacker could also potentially leverage reflected XSS into stored XSS to attack site visitors, even on sites where file editing and user creation functionality was locked down.\n\n## Timeline\n\n**February 15, 2022** - The Wordfence Threat Intelligence team finishes our investigation and releases a firewall rule to Wordfence Premium, Care, and Response users to protect against any exploits targeting this vulnerability. We initiate the responsible disclosure process and receive a response from the plugin\u2019s developers. We send over full disclosure. \n**February 17, 2022** - Plugin changelog shows the issue is fixed. \n**February 18, 2022** - A patched version of the plugin, 1.1.17, is released on the WordPress repo. \n**March 17, 2022** - The firewall rule becomes available to free Wordfence users.\n\n## Conclusion\n\nIn today\u2019s article, we discussed a reflected XSS vulnerability in Header Footer Code Manager. While this would require tricking an administrator into clicking a link or performing some other action, it still offers the potential for site takeover. As such we urge you to update to the latest version of this plugin, 1.1.17 as of this writing, as soon as possible.\n\nSites running [Wordfence Premium](<https://www.wordfence.com/products/wordfence-premium/>), [Wordfence Care](<https://www.wordfence.com/products/wordfence-care/>), and [Wordfence Response](<https://www.wordfence.com/products/wordfence-response/>) are fully protected against this vulnerability. Sites running the free version of Wordfence are partially protected and will receive full protection on March 17, 2022.\n\nIf you believe your site has been compromised as a result of this vulnerability or any other vulnerability, we offer Incident Response services via[ Wordfence Care](<https://www.wordfence.com/products/wordfence-care/>). If you need your site cleaned immediately,[ Wordfence Response](<https://www.wordfence.com/products/wordfence-response/>) offers the same service with 24/7/365 availability and a 1-hour response time. Both these products include hands-on support in case you need further assistance.\n\nIf you know a friend or colleague who is using this plugin on their site, we highly recommend forwarding this advisory to them to help keep their sites protected, as this is a serious vulnerability that can lead to complete site takeover.\n\n_Thanks to Charlie Patel, CEO of 99robots, for rapidly and personally responding to our disclosure_\n\nThe post [Reflected XSS in Header Footer Code Manager](<https://www.wordfence.com/blog/2022/02/reflected-xss-in-header-footer-code-manager/>) appeared first on [Wordfence](<https://www.wordfence.com>).", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2022-02-22T14:01:19", "type": "wordfence", "title": "Reflected XSS in Header Footer Code Manager", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-0710"], "modified": "2022-02-22T14:01:19", "id": "WORDFENCE:56D3776A1F748756ACCFC38BB72C1A35", "href": "https://www.wordfence.com/blog/2022/02/reflected-xss-in-header-footer-code-manager/", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "nessus": [{"lastseen": "2022-03-16T19:07:34", "description": "The WordPress Header Footer Code Manager Plugin installed on the remote host is affected by a reflected Cross-Site Scripting (XSS) vulnerability due to improper validation of user-supplied input.\n\nNote that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "published": "2022-03-01T00:00:00", "type": "nessus", "title": "Header Footer Code Manager Plugin for WordPress < 1.1.17 Cross-Site Scripting", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-0710"], "modified": "2022-03-07T00:00:00", "cpe": [], "id": "WEB_APPLICATION_SCANNING_113161", "href": "https://www.tenable.com/plugins/was/113161", "sourceData": "No source data", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "wpvulndb": [{"lastseen": "2022-04-14T15:43:06", "description": "The plugin does not escape the page parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2022-02-22T00:00:00", "type": "wpvulndb", "title": "Header Footer Code Manager < 1.1.17 - Reflected Cross-Site Scripting", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-0710"], "modified": "2022-04-12T08:18:21", "id": "WPVDB-ID:23DF8F1F-FEB9-4D42-9B91-130ACF656E71", "href": "https://wpscan.com/vulnerability/23df8f1f-feb9-4d42-9b91-130acf656e71", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "packetstorm": [{"lastseen": "2022-02-22T17:23:00", "description": "", "cvss3": {}, "published": "2022-02-22T00:00:00", "type": "packetstorm", "title": "WordPress 99robots Header Footer Code Manager 1.1.16 Cross Site Scripting", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2022-0710"], "modified": "2022-02-22T00:00:00", "id": "PACKETSTORM:166091", "href": "https://packetstormsecurity.com/files/166091/WordPress-99robots-Header-Footer-Code-Manager-1.1.16-Cross-Site-Scripting.html", "sourceData": "`On February 15, 2022, the Wordfence Threat Intelligence team responsibly disclosed a reflected Cross-Site Scripting (XSS) vulnerability in Header Footer Code Manager, a WordPress plugin with over 300,000 installations. \n \nThe plugin publisher quickly acknowledged our initial contact and we sent the full disclosure details the same day, on February 15, 2022. A patched version, 1.1.17, was implemented a few days later and made available on February 18, 2022. \n \nWordfence Premium, Wordfence Care, and Wordfence Response customers received a firewall rule to protect against this vulnerability on February 15, 2022. Sites still running the free version of Wordfence are partially protected against this exploit by our built-in XSS rule, but will receive full protection 30 days later, on March 17, 2022. \n \nDescription: Reflected Cross-Site Scripting \n \nAffected Plugin: Header Footer Code Manager \n \nPlugin Slug: header-footer-code-manager \n \nPlugin Developer: 99robots \n \nAffected Versions: <= 1.1.16 \n \nCVE ID: CVE-2022-0710 \n \nCVSS Score: 6.1 (Medium) \n \nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N \n \nResearcher/s: Ramuel Gall \n \nFully Patched Version: 1.1.17 \n \nHeader Footer Code Manager is a WordPress plugin designed to allow administrators to add code snippets to the header or footer of a website. One of the admin panel pages added by the plugin allows administrators to view a list of code snippets that had been added to the site, which included links to edit or delete these existing code snippets. The plugin\u2019s column_name function used the $_REQUEST[\u2018page\u2019] parameter to construct this link. \n \nWordPress uses the value of the $_GET[\u2018page\u2019] parameter in order to determine which page the user is currently visiting, and will block unauthorized users if they\u2019re not allowed to access the current page set in $_GET[\u2018page\u2019]. This means that $_REQUEST[\u2018page\u2019] might be expected to just contain the admin page used to display the list of code snippets, hfcm-list. However, due to a quirk of how PHP handles superglobal variables, $_REQUEST parameters can be overloaded. \n \nPHP populates the $_REQUEST superglobal variable from $_GET, $_POST, and $_COOKIE. That means that normally, if a $_GET[\u2018page\u2019] parameter is sent, $_REQUEST[\u2018page\u2019] will be populated with the value of $_GET[\u2018page\u2019]. In most PHP configurations, however, the request_order (or variables_order if request_order is not set) means that if a request is sent with both a $_GET[\u2018page\u2019] parameter and a $_POST[\u2018page\u2019] parameter, the value of $_REQUEST[\u2018page\u2019] is set to the value of $_POST[\u2018page\u2019]. \n \nThe upshot is that this can be used to execute JavaScript in the browser of a logged-in administrator, for instance, by tricking them into visiting a self-submitting form that sends a POST request to e.g. hxxps://victimsite.site/wp-admin/admin.php?page=hfcm-list, with the $_POST[\u2018page\u2019] parameter set to malicious JavaScript. \n \nThe $_GET[\u2018page\u2019] parameter means that WordPress will route the victim to the correct page, and then the value of $_REQUEST[\u2018page\u2019] (which in nearly all configurations will be set to the value of $_POST[\u2018page\u2019]) will get echoed out onto the page. \n \nMost XSS can be used to perform actions using an administrator\u2019s session, which includes the ability to create malicious administrators and in some cases add backdoors. Additionally, this particular plugin is used to add code to a site, so an attacker could also potentially leverage reflected XSS into stored XSS to attack site visitors, even on sites where file editing and user creation functionality was locked down. \n \nTimeline \n \nFebruary 15, 2022 - The Wordfence Threat Intelligence team finishes our investigation and releases a firewall rule to Wordfence Premium, Care, and Response users to protect against any exploits targeting this vulnerability. We initiate the responsible disclosure process and receive a response from the plugin\u2019s developers. We send over full disclosure. \n \nFebruary 17, 2022 - Plugin changelog shows the issue is fixed. \n \nFebruary 18, 2022 - A patched version of the plugin, 1.1.17, is released on the WordPress repo. \n \nMarch 17, 2022 - The firewall rule becomes available to free Wordfence users. \n \nConclusion \n \nIn today\u2019s article, we discussed a reflected XSS vulnerability in Header Footer Code Manager. While this would require tricking an administrator into clicking a link or performing some other action, it still offers the potential for site takeover. As such we urge you to update to the latest version of this plugin, 1.1.17 as of this writing, as soon as possible. \n \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/166091/wpheaderfooter1116-xss.txt"}], "zdt": [{"lastseen": "2022-03-03T23:59:04", "description": "", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2022-02-22T00:00:00", "type": "zdt", "title": "WordPress 99robots Header Footer Code Manager 1.1.16 Cross Site Scripting Vulnerability", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-0710"], "modified": "2022-02-22T00:00:00", "id": "1337DAY-ID-37411", "href": "https://0day.today/exploit/description/37411", "sourceData": "The Wordfence Threat Intelligence team responsibly disclosed a reflected Cross-Site Scripting (XSS) vulnerability in Header Footer Code Manager, a WordPress plugin with over 300,000 installations.\n\nThe plugin publisher quickly acknowledged our initial contact and we sent the full disclosure details the same day, on February 15, 2022. A patched version, 1.1.17, was implemented a few days later and made available on February 18, 2022.\n\nWordfence Premium, Wordfence Care, and Wordfence Response customers received a firewall rule to protect against this vulnerability on February 15, 2022. Sites still running the free version of Wordfence are partially protected against this exploit by our built-in XSS rule, but will receive full protection 30 days later, on March 17, 2022.\n\nDescription: Reflected Cross-Site Scripting\n\nAffected Plugin: Header Footer Code Manager\n\nPlugin Slug: header-footer-code-manager\n\nPlugin Developer: 99robots\n\nAffected Versions: <= 1.1.16\n\nCVE ID: CVE-2022-0710\n\nCVSS Score: 6.1 (Medium)\n\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nResearcher/s: Ramuel Gall\n\nFully Patched Version: 1.1.17\n\nHeader Footer Code Manager is a WordPress plugin designed to allow administrators to add code snippets to the header or footer of a website. One of the admin panel pages added by the plugin allows administrators to view a list of code snippets that had been added to the site, which included links to edit or delete these existing code snippets. The plugin\u2019s column_name function used the $_REQUEST[\u2018page\u2019] parameter to construct this link.\n\nWordPress uses the value of the $_GET[\u2018page\u2019] parameter in order to determine which page the user is currently visiting, and will block unauthorized users if they\u2019re not allowed to access the current page set in $_GET[\u2018page\u2019]. This means that $_REQUEST[\u2018page\u2019] might be expected to just contain the admin page used to display the list of code snippets, hfcm-list. However, due to a quirk of how PHP handles superglobal variables, $_REQUEST parameters can be overloaded.\n\nPHP populates the $_REQUEST superglobal variable from $_GET, $_POST, and $_COOKIE. That means that normally, if a $_GET[\u2018page\u2019] parameter is sent, $_REQUEST[\u2018page\u2019] will be populated with the value of $_GET[\u2018page\u2019]. In most PHP configurations, however, the request_order (or variables_order if request_order is not set) means that if a request is sent with both a $_GET[\u2018page\u2019] parameter and a $_POST[\u2018page\u2019] parameter, the value of $_REQUEST[\u2018page\u2019] is set to the value of $_POST[\u2018page\u2019].\n\nThe upshot is that this can be used to execute JavaScript in the browser of a logged-in administrator, for instance, by tricking them into visiting a self-submitting form that sends a POST request to e.g. hxxps://victimsite.site/wp-admin/admin.php?page=hfcm-list, with the $_POST[\u2018page\u2019] parameter set to malicious JavaScript.\n\nThe $_GET[\u2018page\u2019] parameter means that WordPress will route the victim to the correct page, and then the value of $_REQUEST[\u2018page\u2019] (which in nearly all configurations will be set to the value of $_POST[\u2018page\u2019]) will get echoed out onto the page.\n\nMost XSS can be used to perform actions using an administrator\u2019s session, which includes the ability to create malicious administrators and in some cases add backdoors. Additionally, this particular plugin is used to add code to a site, so an attacker could also potentially leverage reflected XSS into stored XSS to attack site visitors, even on sites where file editing and user creation functionality was locked down.\n\nTimeline\n\nFebruary 15, 2022 - The Wordfence Threat Intelligence team finishes our investigation and releases a firewall rule to Wordfence Premium, Care, and Response users to protect against any exploits targeting this vulnerability. We initiate the responsible disclosure process and receive a response from the plugin\u2019s developers. We send over full disclosure.\n\nFebruary 17, 2022 - Plugin changelog shows the issue is fixed.\n\nFebruary 18, 2022 - A patched version of the plugin, 1.1.17, is released on the WordPress repo.\n\nMarch 17, 2022 - The firewall rule becomes available to free Wordfence users.\n\nConclusion\n\nIn today\u2019s article, we discussed a reflected XSS vulnerability in Header Footer Code Manager. While this would require tricking an administrator into clicking a link or performing some other action, it still offers the potential for site takeover. As such we urge you to update to the latest version of this plugin, 1.1.17 as of this writing, as soon as possible.\n", "sourceHref": "https://0day.today/exploit/37411", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "patchstack": [{"lastseen": "2022-06-01T19:26:09", "description": "Reflected Cross-Site Scripting (XSS) vulnerability discovered by Ramuel Gall in WordPress Header Footer Code Manager plugin (versions <= 1.1.16).\n\n## Solution\n\n\r\n Update the WordPress Header Footer Code Manager plugin to the latest available version (at least 1.1.17).\r\n ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2022-02-18T00:00:00", "type": "patchstack", "title": "WordPress Header Footer Code Manager plugin <= 1.1.16 - Reflected Cross-Site Scripting (XSS) vulnerability", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-0710"], "modified": "2022-02-18T00:00:00", "id": "PATCHSTACK:0CE89CFF08E8B42A5E3753A0E807D1DF", "href": "https://patchstack.com/database/vulnerability/header-footer-code-manager/wordpress-header-footer-code-manager-plugin-1-1-16-reflected-cross-site-scripting-xss-vulnerability", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}