The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitise and escape the iowd_tabs_active parameter before rendering it in the plugin admin panel, leading to a reflected Cross-Site Scripting vulnerability, allowing an attacker to trick a logged in admin to execute arbitrary javascript by clicking a link.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-10-08T19:57:23.556Z
Reserved: 2023-04-17T15:15:20.988Z
Link: CVE-2023-2122

Updated: 2024-08-02T06:12:20.406Z

Status : Modified
Published: 2023-08-16T12:15:12.607
Modified: 2024-11-21T07:57:58.750
Link: CVE-2023-2122

No data.