The RSS Feed Widget WordPress plugin before 3.0.1 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Androidbubble
Androidbubble rss Feed Widget |
|
CPEs | cpe:2.3:a:androidbubble:rss_feed_widget:*:*:*:*:*:*:*:* | |
Vendors & Products |
Androidbubble
Androidbubble rss Feed Widget |
|
Metrics |
cvssV3_1
|
Tue, 12 Nov 2024 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The RSS Feed Widget WordPress plugin before 3.0.1 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers | |
Title | RSS Feed Widget < 3.0.1 - Reflected XSS | |
References |
|

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-11-12T14:31:10.703Z
Reserved: 2024-10-10T19:36:11.150Z
Link: CVE-2024-9835

Updated: 2024-11-12T14:31:05.410Z

Status : Awaiting Analysis
Published: 2024-11-12T06:15:04.677
Modified: 2024-11-12T15:35:17.853
Link: CVE-2024-9835

No data.