The SpiderContacts WordPress plugin through 1.1.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-01T15:00:41.459Z
Reserved: 2024-06-22T21:22:03.075Z
Link: CVE-2024-6272

Updated: 2024-08-01T15:00:34.493Z

Status : Awaiting Analysis
Published: 2024-07-31T06:15:03.637
Modified: 2024-08-01T15:35:19.753
Link: CVE-2024-6272

No data.