CVE-2024-5727
June 28, 2024, 10:27 a.m.
None
No Score
Description
The Widget4Call WordPress plugin through 1.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Product(s) Impacted
Product | Versions |
---|---|
Widget4Call WordPress plugin |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
Tags
Timeline
Published: June 28, 2024, 6:15 a.m.
Last Modified: June 28, 2024, 10:27 a.m.
Last Modified: June 28, 2024, 10:27 a.m.
Status : Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
More infoSource
contact@wpscan.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.