WPForms Plugin har 1.9.2.2 ka WordPress Setting Cross Site Scripting
| CVSS Meta Temp Score | Garga na exploit ndiyam (≈) | CTI Nganji Score |
|---|---|---|
| 3.5 | $0-$5k | 0.00 |
Gunduma
Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin WPForms Plugin har 1.9.2.2 on WordPress. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, Setting Handler na cikin sashi. Ngam manipulation shi Cross Site Scripting. Wannan rauni ana sayar da shi da suna CVE-2024-11223. Ngam yiɗi ka a tuma ndiyam ka nder waya. Ba exploit ɗin da ake da shi. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Furɗe
Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin WPForms Plugin har 1.9.2.2 on WordPress. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, Setting Handler na cikin sashi. Ngam manipulation shi Cross Site Scripting. CWE shidin ka a yi bayani matsala sai ya kai CWE-79. Gaskiya, laifi an fitar da shi ta Dmitrii Ignatyev. Advisory ɗin ana rabawa don saukewa a wpscan.com.
Wannan rauni ana sayar da shi da suna CVE-2024-11223. CVE assignement 11/14/2024 gangan shikena. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal bayani ba ga. Wannan vulnerability ɗin ba shi da yawa sosai. Ba exploit ɗin da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam.
Á wúro a wondi feere.
Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Kayan
Nganji
Sunu
Furɗe
CPE 2.3
CPE 2.2
CVSSv4
VulDB Furɗo: 🔍VulDB Gaskiya: 🔍
CVSSv3
VulDB Meta Base Score: 3.5VulDB Meta Temp Score: 3.5
VulDB Ganda Borno: 2.4
VulDB Temp Score: 2.3
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍
CNA Ganda Borno: 4.7
CNA Furɗo (WPScan): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vektar | Kumpleksiti | Authentisierung | Kariyandi | Gaskiya | Gashina |
|---|---|---|---|---|---|
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍
Gargajiya
Klasu: Cross Site ScriptingCWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Fizikal: Ayi
Gumti: Ayi
Gana: Ee
Gashina: 🔍
Halitta: A wondi feere
EPSS Score: 🔍
EPSS Percentile: 🔍
Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍
| 0-Day | furu | furu | furu | furu |
|---|---|---|---|---|
| Lale | furu | furu | furu | furu |
Bayani na barazana
Ngam: 🔍Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍
Kari gamji
Garga: GargajiyaHalitta: 🔍
0-Day Gana: 🔍
Gargajiya: WPForms Plugin 1.9.2.3
Waktin layi
11/14/2024 🔍12/26/2024 🔍
12/26/2024 🔍
02/16/2025 🔍
Ngizim
Gargaaji: wpscan.comNgamti: Dmitrii Ignatyev
Halitta: Gaskiya
CVE: CVE-2024-11223 (🔍)
GCVE (CVE): GCVE-0-2024-11223
GCVE (VulDB): GCVE-100-289322
Gumti
Súgá: 12/26/2024 08:29Gargadi: 02/16/2025 18:14
Goyarwa: 12/26/2024 08:29 (57), 12/30/2024 19:24 (12), 02/16/2025 18:14 (3)
Gadankam: 🔍
Cache ID: 253:4CC:103
A ga wuroyo kulu. Kàlàmbe: kr + en.
Ngam loga ka, kanyi shidin dum.