The Lightweight Accordion WordPress plugin before 1.5.15 is vulnerable to Stored XS
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | Lightweight Accordion < 1.5.15 - Contributor+ Stored XSS | 23 Jan 202300:00 | – | wpvulndb |
![]() | CVE-2023-0373 Lightweight Accordion < 1.5.15 - Contributor+ Stored XSS | 13 Feb 202314:32 | – | cvelist |
![]() | CVE-2023-0373 | 13 Feb 202315:15 | – | nvd |
![]() | Cross site scripting | 13 Feb 202315:15 | – | prion |
![]() | CVE-2023-0373 Lightweight Accordion < 1.5.15 - Contributor+ Stored XSS | 13 Feb 202314:32 | – | vulnrichment |
![]() | CVE-2023-0373 | 23 May 202502:52 | – | redhatcve |
![]() | WordPress Lightweight Accordion Plugin < 1.5.15 is vulnerable to Cross Site Scripting (XSS) | 23 Jan 202300:00 | – | patchstack |
![]() | Lightweight Accordion < 1.5.15 - Contributor+ Stored XSS | 23 Jan 202300:00 | – | wpexploit |
[
{
"vendor": "Unknown",
"product": "Lightweight Accordion",
"versions": [
{
"status": "affected",
"versionType": "custom",
"version": "0",
"lessThan": "1.5.15"
}
],
"defaultStatus": "unaffected",
"collectionURL": "https://wordpress.org/plugins"
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
Additional CSS class(es) | nested | /wp-admin/admin-ajax.php | The plugin allows users to add additional CSS classes which can be exploited to inject malicious JavaScript, leading to Stored Cross-Site Scripting attacks. | CWE-79 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo