The Evaluate WordPress plugin through 1.0 does not sanitize settings, allowing high-privilege users to perform XSS attacks
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Evaluate <= 1.0 - Admin+ Stored Cross-Site Scripting | 29 Oct 202200:00 | β | wpvulndb |
![]() | CVE-2022-3753 Evaluate <= 1.0 - Admin+ Stored Cross-Site Scripting | 21 Nov 202200:00 | β | cvelist |
![]() | WordPress Evaluate plugin cross-site scripting vulnerability | 23 Nov 202200:00 | β | cnvd |
![]() | Cross site scripting | 21 Nov 202211:15 | β | prion |
![]() | WordPress Evaluate plugin <= 1.0 - Auth. Stored Cross-Site Scripting (XSS) vulnerability | 29 Oct 202200:00 | β | patchstack |
![]() | Evaluate <= 1.0 - Admin+ Stored Cross-Site Scripting | 29 Oct 202200:00 | β | wpexploit |
![]() | CVE-2022-3753 | 21 Nov 202211:15 | β | nvd |
[
{
"vendor": "Unknown",
"product": "Evaluate",
"collectionURL": "https://wordpress.org/plugins",
"versions": [
{
"status": "affected",
"versionType": "custom",
"version": "0",
"lessThanOrEqual": "1.0"
}
],
"defaultStatus": "affected"
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo