The YML for Yandex Market plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the feed_id parameter in all versions up to, and including, 4.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Wed, 12 Mar 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Icopydoc
Icopydoc yml For Yandex Market
Weaknesses CWE-79
CPEs cpe:2.3:a:icopydoc:yml_for_yandex_market:*:*:*:*:*:wordpress:*:*
Vendors & Products Icopydoc
Icopydoc yml For Yandex Market

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T18:33:25.644Z

Reserved: 2024-02-08T19:31:57.224Z

Link: CVE-2024-1365

cve-icon Vulnrichment

Updated: 2024-08-01T18:33:25.644Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-13T16:15:20.417

Modified: 2025-03-12T12:19:59.460

Link: CVE-2024-1365

cve-icon Redhat

No data.