The Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue
[
{
"product": "Plezi",
"vendor": "Unknown",
"versions": [
{
"lessThan": "1.0.0*",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThan": "1.0.3",
"status": "affected",
"version": "1.0.3",
"versionType": "custom"
}
]
}
]