The plugin does not have CSRF check when creating or editing a quote and does not sanitise and escape Quotes. As a result, attacker could make a logged in admin create or edit arbitrary quote, and put Cross-Site Scripting payloads in them
CPE | Name | Operator | Version |
---|---|---|---|
simple-quotation | eq | * |