{ "schema_version": "1.4.0", "id": "GHSA-6jwf-2xx4-59h4", "modified": "2024-04-04T03:50:39Z", "published": "2023-05-08T15:30:18Z", "aliases": [ "CVE-2023-0421" ], "details": "The Cloud Manager WordPress plugin through 1.0 does not sanitise and escape the query param ricerca before outputting it in an admin panel, allowing unauthenticated attackers to trick a logged in admin to trigger a XSS payload by clicking a link.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0421" }, { "type": "WEB", "url": "https://wpscan.com/vulnerability/a356fea0-f143-4736-b2b2-c545c525335c" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-05-08T14:15:11Z" } }