Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-9613

Summary
Assigner-Wordfence
Assigner Org ID-b15e7b5b-3da4-40ae-a43c-f7aa60e62599
Published At-26 Oct, 2024 | 02:31
Updated At-08 Apr, 2026 | 17:29
Rejected At-
Credits

FormFacade – WordPress plugin for Google Forms <= 1.3.6 - Reflected Cross-Site Scripting

The FormFacade – WordPress plugin for Google Forms plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'userId' and 'publishId' parameters in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Wordfence
Assigner Org ID:b15e7b5b-3da4-40ae-a43c-f7aa60e62599
Published At:26 Oct, 2024 | 02:31
Updated At:08 Apr, 2026 | 17:29
Rejected At:
▼CVE Numbering Authority (CNA)
FormFacade – WordPress plugin for Google Forms <= 1.3.6 - Reflected Cross-Site Scripting

The FormFacade – WordPress plugin for Google Forms plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'userId' and 'publishId' parameters in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Affected Products
Vendor
manidoraisamy
Product
FormFacade – Embed Google Forms in your website
Default Status
unaffected
Versions
Affected
  • From 0 through 1.3.6 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-79CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: CWE-79
Description: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
vgo0
Timeline
EventDate
Disclosed2024-10-25 13:59:02
Event: Disclosed
Date: 2024-10-25 13:59:02
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a00ad0-5761-4fb7-a4e6-cb213cf32cb2?source=cve
N/A
https://plugins.trac.wordpress.org/browser/formfacade/trunk/formfacade.php#L173
N/A
https://plugins.trac.wordpress.org/changeset/3182047/formfacade/trunk/formfacade.php
N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a00ad0-5761-4fb7-a4e6-cb213cf32cb2?source=cve
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/formfacade/trunk/formfacade.php#L173
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/changeset/3182047/formfacade/trunk/formfacade.php
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
manidoraisamy
Product
formfacade
CPEs
  • cpe:2.3:a:manidoraisamy:formfacade:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through 1.3.6 (semver)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@wordfence.com
Published At:26 Oct, 2024 | 03:15
Updated At:08 Apr, 2026 | 19:22

The FormFacade – WordPress plugin for Google Forms plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'userId' and 'publishId' parameters in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Primary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE Matches

formfacade
formfacade
>>formfacade>>Versions before 1.3.7(exclusive)
cpe:2.3:a:formfacade:formfacade:*:*:*:*:*:wordpress:*:*
Weaknesses
CWE IDTypeSource
CWE-79Secondarysecurity@wordfence.com
CWE ID: CWE-79
Type: Secondary
Source: security@wordfence.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://plugins.trac.wordpress.org/browser/formfacade/trunk/formfacade.php#L173security@wordfence.com
Product
https://plugins.trac.wordpress.org/changeset/3182047/formfacade/trunk/formfacade.phpsecurity@wordfence.com
N/A
https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a00ad0-5761-4fb7-a4e6-cb213cf32cb2?source=cvesecurity@wordfence.com
Third Party Advisory
Hyperlink: https://plugins.trac.wordpress.org/browser/formfacade/trunk/formfacade.php#L173
Source: security@wordfence.com
Resource:
Product
Hyperlink: https://plugins.trac.wordpress.org/changeset/3182047/formfacade/trunk/formfacade.php
Source: security@wordfence.com
Resource: N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a00ad0-5761-4fb7-a4e6-cb213cf32cb2?source=cve
Source: security@wordfence.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

10378Records found

CVE-2024-9110
Matching Score-4
Assigner-BeyondTrust Inc.
ShareView Details
Matching Score-4
Assigner-BeyondTrust Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.51% / 66.67%
||
7 Day CHG~0.00%
Published-30 Oct, 2024 | 16:57
Updated-11 Feb, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-Site Scripting In Privileged Identity

A medium severity vulnerability has been identified within Privileged Identity which can allow an attacker to perform reflected cross-site scripting attacks.

Action-Not Available
Vendor-BeyondTrust Corporation
Product-privileged_identityPrivileged Identityprivileged_identity
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8724
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.84% / 83.10%
||
7 Day CHG~0.00%
Published-14 Sep, 2024 | 03:19
Updated-08 Apr, 2026 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Waitlist Woocommerce ( Back in stock notifier ) <= 2.7.5 - Reflected Cross-Site Scripting

The Waitlist Woocommerce ( Back in stock notifier ) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-xootixxootix
Product-waitlist_woocommerceWaitlist Woocommerce ( Back in stock notifier )
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8544
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.55% / 81.57%
||
7 Day CHG~0.00%
Published-24 Sep, 2024 | 01:56
Updated-08 Apr, 2026 | 17:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pixel Cat – Conversion Pixel Manager <= 3.0.5 - Reflected Cross-Site Scripting

The Pixel Cat – Conversion Pixel Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.0.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-fatcatappsfatcatapps
Product-pixel_catPixel Cat – Conversion Pixel Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-33005
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.20%
||
7 Day CHG~0.00%
Published-27 Jun, 2022 | 20:56
Updated-03 Aug, 2024 | 07:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) vulnerability in the System Settings/IOT Settings module of Delta Electronics DIAEnergie v1.08.00 allows attackers to execute arbitrary web scripts via a crafted payload injected into the Name text field.

Action-Not Available
Vendor-n/aDelta Electronics, Inc.
Product-diaenergien/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8562
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 31.43%
||
7 Day CHG~0.00%
Published-07 Sep, 2024 | 19:00
Updated-10 Sep, 2024 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester PHP CRUD Add.php cross site scripting

A vulnerability was found in SourceCodester PHP CRUD 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /endpoint/Add.php. The manipulation of the argument first_name/middle_name/last_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-remyandradeSourceCodester
Product-php_crudPHP CRUD
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4903
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 56.07%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 16:55
Updated-07 Aug, 2024 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site Scripting (XSS) in TYPO3 before 4.3.12, 4.4.x before 4.4.9, and 4.5.x before 4.5.4 allows remote attackers to inject arbitrary web script or HTML via the RemoveXSS function.

Action-Not Available
Vendor-TYPO3 Association
Product-typo3TYPO3
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8850
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.26% / 79.53%
||
7 Day CHG~0.00%
Published-19 Sep, 2024 | 03:59
Updated-25 Sep, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MC4WP: Mailchimp for WordPress 4.9.9 - 4.9.16 - Reflected Cross-Site Scripting

The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email' parameter when a placeholder such as {email} is used for the field in versions 4.9.9 to 4.9.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-ibericodedvankooten
Product-mailchimpMC4WP: Mailchimp for WordPress
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8653
Matching Score-4
Assigner-Kaspersky
ShareView Details
Matching Score-4
Assigner-Kaspersky
CVSS Score-5.9||MEDIUM
EPSS-0.17% / 37.24%
||
7 Day CHG~0.00%
Published-19 Sep, 2024 | 16:39
Updated-23 Sep, 2024 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Netcat CMS: multiple reflected cross-site scripting vulnerabilities in netshop module

A vulnerability in NetCat CMS allows an attacker to execute JavaScript code in a user's browser when they visit specific paths on the site. This issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others. Apply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch.

Action-Not Available
Vendor-netcatNetCat
Product-netcat_content_management_systemNetCat CMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8793
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.81% / 86.24%
||
7 Day CHG~0.00%
Published-01 Oct, 2024 | 08:30
Updated-08 Apr, 2026 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Store Exporter for WooCommerce – Export Products, Export Orders, Export Subscriptions, and More <= 2.7.2.1 - Reflected Cross-Site Scripting

The Store Exporter for WooCommerce – Export Products, Export Orders, Export Subscriptions, and More plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.7.2.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-visserjkohlbach
Product-store_exporter_for_woocommerceStore Exporter – Export WooCommerce Products, Orders, Subscriptions, Customers
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-9214
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.61% / 85.76%
||
7 Day CHG~0.00%
Published-24 Oct, 2024 | 11:03
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Extra Product Options Builder for WooCommerce <= 1.2.133 - Unauthenticated Stored Cross-Site Scripting

The Extra Product Options Builder for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'RednaoSerializedFields' parameter during the creation of a signature file in all versions up to, and including, 1.2.133 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-edgarrojas
Product-Extra Product Options Builder for WooCommerce
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8727
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.83% / 83.06%
||
7 Day CHG~0.00%
Published-01 Oct, 2024 | 07:30
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DK PDF <= 1.9.6 - Reflected Cross-Site Scripting

The DK PDF plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.9.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-torstenbulk
Product-DK PDF – WordPress PDF Generator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8622
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.74% / 73.08%
||
7 Day CHG~0.00%
Published-12 Sep, 2024 | 08:30
Updated-08 Apr, 2026 | 16:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
amCharts: Charts and Maps <= 1.4.4 - Reflected Cross-Site Scripting via Cross-Site Request Forgery

The amCharts: Charts and Maps plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'amcharts_javascript' parameter in all versions up to, and including, 1.4.4 due to the ability to supply arbitrary JavaScript a lack of nonce validation on the preview functionality. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-amchartsmartynasma
Product-amcharts\amCharts: Charts and Maps
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8792
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.33% / 84.94%
||
7 Day CHG~0.00%
Published-30 Oct, 2024 | 02:32
Updated-08 Apr, 2026 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Subscribe to Comments <= 2.3 - Reflected Cross-Site Scripting

The Subscribe to Comments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-markjaquithmarkjaquith
Product-subscribe_to_commentsSubscribe to Comments
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8729
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.17% / 84.46%
||
7 Day CHG~0.00%
Published-10 Oct, 2024 | 02:06
Updated-08 Apr, 2026 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Easy Social Share Buttons <= 1.4.5 - Reflected Cross-Site Scripting

The Easy Social Share Buttons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.4.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-idiombrianbrey
Product-easy_social_share_buttonsEasy Social Share Buttons
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-32770
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.6||CRITICAL
EPSS-14.42% / 94.48%
||
7 Day CHG~0.00%
Published-22 Aug, 2022 | 18:27
Updated-15 Apr, 2025 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "toast" parameter which is inserted into the document with insufficient sanitization.

Action-Not Available
Vendor-wwbnWWBN
Product-avideoAVideo
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8703
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 45.04%
||
7 Day CHG~0.00%
Published-15 May, 2025 | 20:07
Updated-28 May, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Z-Downloads < 1.11.6 - Unauthenticated Stored XSS

The Z-Downloads WordPress plugin before 1.11.6 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated visitors to perform Cross-Site Scripting attacks when accessing share URLs.

Action-Not Available
Vendor-urbanbaseUnknown
Product-z-downloadsZ-Downloads
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2015-5593
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.37% / 59.09%
||
7 Day CHG~0.00%
Published-31 Dec, 2019 | 20:42
Updated-06 Aug, 2024 | 06:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sanitize_string function in Zenphoto before 1.4.9 does not properly sanitize HTML tags, which allows remote attackers to perform a cross-site scripting (XSS) attack by wrapping a payload in "<<script></script>script>payload<script></script></script>", or in an image tag, with the payload as the onerror event.

Action-Not Available
Vendor-zenphoton/a
Product-zenphoton/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4626
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.33% / 56.07%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 16:07
Updated-07 Aug, 2024 | 00:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site Scripting (XSS) in TYPO3 before 4.3.12, 4.4.x before 4.4.9, and 4.5.x before 4.5.4 allows remote attackers to inject arbitrary web script or HTML via the "JSwindow" property of the typolink function.

Action-Not Available
Vendor-TYPO3 Association
Product-typo3TYPO3
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8731
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.57% / 85.65%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 15:10
Updated-08 Apr, 2026 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cron Jobs <= 1.2.9 - Reflected Cross-Site Scripting

The Cron Jobs plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.9. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-leiraarielhr1987
Product-cron_jobsCron Jobs
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-9209
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.80% / 86.22%
||
7 Day CHG~0.00%
Published-01 Oct, 2024 | 08:30
Updated-08 Apr, 2026 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Search Analytics <= 1.4.10 - Reflected Cross-Site Scripting

The WP Search Analytics plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.4.10. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-cornelraiucornelraiu-1
Product-wp_search_analyticsSearch Analytics for WP
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4336
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.93% / 76.20%
||
7 Day CHG~0.00%
Published-15 Jan, 2020 | 13:48
Updated-07 Aug, 2024 | 00:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php.

Action-Not Available
Vendor-tikiTiki
Product-tikiwiki_cms\/groupwareWiki CMS Groupware
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8648
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-6.1||MEDIUM
EPSS-3.05% / 86.80%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 13:02
Updated-12 Dec, 2024 | 21:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab

An issue has been discovered in GitLab CE/EE affecting all versions from 16 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. The vulnerability could allow an attacker to inject malicious JavaScript code in Analytics Dashboards through a specially crafted URL.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-9204
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.83% / 83.06%
||
7 Day CHG~0.00%
Published-04 Oct, 2024 | 02:04
Updated-08 Apr, 2026 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Smart Custom 404 Error Page <= 11.4.7 - Reflected Cross-Site Scripting

The Smart Custom 404 Error Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via $_SERVER['REQUEST_URI'] in all versions up to, and including, 11.4.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-nerdpressnerdpressteam
Product-smart_custom_404_error_pageSmart Custom 404 Error Page
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-9092
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.14% / 34.03%
||
7 Day CHG~0.00%
Published-23 Sep, 2024 | 00:31
Updated-27 Sep, 2024 | 16:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Profile Registration without Reload Refresh Registration Form add.php cross site scripting

A vulnerability was found in SourceCodester Profile Registration without Reload Refresh 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file add.php of the component Registration Form. The manipulation of the argument full_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Action-Not Available
Vendor-remyandradeSourceCodester
Product-profile_registration_without_reload\/refreshProfile Registration without Reload Refreshprofile_registration_without_reload_refresh
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4455
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.31% / 54.46%
||
7 Day CHG~0.00%
Published-20 Nov, 2019 | 18:57
Updated-07 Aug, 2024 | 00:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting vulnerabilities in Tiki 7.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the path info to (1) tiki-admin_system.php, (2) tiki-pagehistory.php, (3) tiki-removepage.php, or (4) tiki-rename_page.php.

Action-Not Available
Vendor-tikin/a
Product-tikin/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-9213
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.71% / 82.50%
||
7 Day CHG~0.00%
Published-17 Oct, 2024 | 06:52
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Persian WooCommerce SMS <= 7.0.2 - Reflected Cross-Site Scripting

The افزونه پیامک ووکامرس Persian WooCommerce SMS plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.0.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-persianscript
Product-افزونه پیامک ووکامرس Persian WooCommerce SMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4090
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-1.43% / 80.76%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 04:09
Updated-06 Aug, 2024 | 23:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Serendipity before 1.6 has an XSS issue in the karma plugin which may allow privilege escalation.

Action-Not Available
Vendor-s9yserendipity
Product-serendipityserendipity
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8471
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-6.3||MEDIUM
EPSS-0.19% / 40.81%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 13:07
Updated-06 Sep, 2024 | 11:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL injection vulnerability in Job Portal

Cross-Site Scripting (XSS) vulnerability, whereby user-controlled input is not sufficiently encrypted. Exploitation of this vulnerability could allow an attacker to retrieve the session details of an authenticated user through JOBID and USERNAME parameters in /jobportal/process.php.

Action-Not Available
Vendor-PHPGurukul LLP
Product-job_portalJob Portal
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8776
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.18% / 39.23%
||
7 Day CHG~0.00%
Published-16 Sep, 2024 | 05:39
Updated-17 Mar, 2026 | 19:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
INTUMIT SmartRobot - Cross-site Scripting

SmartRobot from INTUMIT does not properly validate a specific page parameter, allowing unautheticated remote attackers to inject JavaScript code to the parameter for Reflected Cross-site Scripting attacks.

Action-Not Available
Vendor-intumitINTUMIT
Product-smartrobotSmartRobot
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-9211
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.90% / 83.40%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 06:50
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FULL – Cliente <= 3.1.22 - Reflected Cross-Site Scripting

The FULL – Cliente plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.22. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-fullservices
Product-FULL – Cliente
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-33151
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.19% / 40.31%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 07:14
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability in the specific parameters of Cybozu Office 10.0.0 to 10.8.5 allows remote attackers to inject an arbitrary script via unspecified vectors.

Action-Not Available
Vendor-Cybozu, Inc.
Product-officeCybozu Office
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-32772
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.6||CRITICAL
EPSS-7.80% / 92.03%
||
7 Day CHG~0.00%
Published-22 Aug, 2022 | 18:27
Updated-15 Apr, 2025 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "msg" parameter which is inserted into the document with insufficient sanitization.

Action-Not Available
Vendor-wwbnWWBN
Product-avideoAVideo
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8803
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.80% / 86.22%
||
7 Day CHG~0.00%
Published-26 Sep, 2024 | 02:03
Updated-08 Apr, 2026 | 17:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bulk NoIndex & NoFollow Toolkit <= 2.15 - Reflected Cross-Site Scripting

The Bulk NoIndex & NoFollow Toolkit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.15. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-madfishdigitalmadfishdigital
Product-bulk_noindex_\&_nofollow_toolkitBulk NoIndex & NoFollow Toolkit
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8652
Matching Score-4
Assigner-Kaspersky
ShareView Details
Matching Score-4
Assigner-Kaspersky
CVSS Score-5.9||MEDIUM
EPSS-0.17% / 37.24%
||
7 Day CHG~0.00%
Published-19 Sep, 2024 | 16:35
Updated-23 Sep, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Netcat CMS: reflected cross-site scripting in openstat module

A vulnerability in NetCat CMS allows an attacker to execute JavaScript code in a user's browser when they visit specific path on the site. This issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others. Apply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch.

Action-Not Available
Vendor-netcatNetCat
Product-netcat_content_management_systemNetCat CMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-33322
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.49% / 81.21%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-01 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-msz-ap25\/35\/42\/50\/60\/71vgk-er3_firmwaremsz-ay25\/35\/42\/50vgk-et1_firmwaremsz-ft25\/35\/50vgk-sc2_firmwaremsxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1mac-588if-ema-ew85s-uk_firmwaremsz-bt20\/25\/35\/50vgk-et2_firmwares-mac-002if_firmwaremsz-bt20\/25\/35\/50vgk-et3_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2_firmwaremsz-gzy09\/12\/18vfkmac-587if2-emsz-ap25\/35\/42\/50\/60\/71vgk-et3msz-ay25\/35\/42\/50vgkp-et1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e2_firmwaremsz-ln25\/35\/50\/60vg2v-er3msz-ln25\/35\/50vg2r-en2_firmwaremsz-ap25\/35\/42\/50vgk-en2msz-ft25\/35\/50vgk-sc1msz-ln25\/35\/50vg2r-en2msz-wx18\/20\/25vfk_firmwaremsy-gp10\/13\/15\/18\/20\/24vfk-sg1msz-ap25\/35\/42\/50vgk-er1_firmwarema-ew85s-emsz-bt20\/25\/35\/50vgk-er1msz-ln18\/25\/35\/50\/60vg2w-e2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er2msz-ln18\/25\/35\/50\/60vg2v-e3_firmwaremsz-ln25\/35\/50\/60vg2v-a2_firmwaremsz-ef22\/25\/35\/42\/50vgks-et1_firmwaremsz-rw25\/35\/50vg-sc1_firmwaremsz-bt20\/25\/35\/50vgk-et2msz-ln25\/35\/50\/60vg2v-er2msz-ln25\/35\/50vg2b-en2mac-507if-e_firmwaremsz-wx18\/20\/25vfkmac-507if-emsz-ln25\/35\/50\/60vg2r-et3msz-exa09\/12vakmsxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-et2msz-ef18\/22\/25\/35\/42\/50vgkb-e2_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e3msz-ay25\/35\/42\/50vgk-er1msz-ln25\/35\/50\/60vg2b-et3msz-ay25\/35\/42\/50vgk-e6_firmwaremsz-bt20\/25\/35\/50vgk-er2_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1_firmwaremsz-bt20\/25\/35\/50vgk-et1msz-ef22\/25\/35\/42\/50vgkw-et1_firmwaremac-588if-e_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-e1_firmwaremsz-rw25\/35\/50vg-et1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er2_firmwaremsz-bt20\/25\/35\/50vgk-e3_firmwaremsz-ay25\/35\/42\/50vgkp-er1msz-ef22\/25\/35\/42\/50vgkb-er1msz-ln25\/35\/50vg2v-sc1_firmwaremsz-ap25\/35\/42\/50vgk-er1msz-ap25\/35\/42\/50vgk-en3msz-ef22\/25\/35\/42\/50vgkb-et2_firmwaremsz-ef22\/25\/35\/42\/50vgks-er2msz-ln25\/35\/50vg2w-en2msz-ef22\/25\/35\/42\/50vgkw-a1_firmwaremsz-hr25\/35\/42\/50vfk-e6_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e2msz-ln18\/25\/35\/50\/60vg2r-e3_firmwaremsz-ln25\/35\/50\/60vg2r-er3msz-ln25\/35\/50\/60vg2w-et3_firmwaremsz-bt20\/25\/35\/50vgk-e2msz-ef22\/25\/35\/42\/50vgkb-et1msz-ay25\/35\/42\/50vgkp-sc1_firmwaremsz-bt20\/25\/35\/50vgk-e2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er1_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2msz-ln25\/35\/50\/60vg2r-er2_firmwaremsz-ln25\/35\/50\/60vg2r-a2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-et1_firmwaremsz-ft25\/35\/50vgk-et1msz-ft25\/35\/50vgk-e1_firmwaremsz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2_firmwaremsz-ap25\/35\/42\/50vgk-et1msz-ef22\/25\/35\/42\/50vgkb-a1msz-ft25\/35\/50vgk-sc2mfz-gxt50\/60\/73vfk_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-e3msz-hr25\/35\/42\/50\/60\/71vfk-er1msz-ln25\/35\/50vg2b-sc1msz-rw25\/35\/50vg-e1_firmwaremsz-rw25\/35\/50vg-e1msz-ln25\/35\/50\/60vg2w-et3mac-587if2-e_firmwaremsz-ln25\/35\/50\/60vg2v-et3_firmwaremsz-ay25\/35\/42\/50vgkp-e6msy-gp10\/13\/15\/18\/20\/24vfk-sg1_firmwaremsz-ap25\/35\/42\/50vgk-e7_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e1msz-ef22\/25\/35\/42\/50vgks-et2msz-ef22\/25\/35\/42\/50vgkw-et1msz-hr25\/35\/42\/50vfk-e6msz-ln25\/35\/50\/60vg2b-et2_firmwaremsz-ln25\/35\/50\/60vg2b-et3_firmwaremsz-ef22\/25\/35\/42\/50vgks-er2_firmwaremsz-ef22\/25\/35\/42\/50vgks-a1_firmwaremsz-ap25\/35\/42\/50vgk-en1_firmwaremsz-ay25\/35\/42\/50vgkp-e6_firmwaremsz-ln25\/35\/50\/60vg2r-er3_firmwaremsz-ln25\/35\/50\/60vg2r-et2msz-rw25\/35\/50vg-et1msz-bt20\/25\/35\/50vgk-e1_firmwaremsz-ln25\/35\/50\/60vg2b-er2msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2_firmwaremsz-ap25\/35\/42\/50vgk-e7msz-ay25\/35\/42\/50vgk-e6msz-ln18\/25\/35\/50\/60vg2b-e2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e1msz-ln25\/35\/50\/60vg2v-er3_firmwaremsz-ln25\/35\/50\/60vg2b-er3msz-ay25\/35\/42\/50vgk-e1_firmwaremfz-xt50\/60vfk_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e2msz-bt20\/25\/35\/50vgk-er2msz-ft25\/35\/50vgk-e2_firmwaremsz-ln25\/35\/50\/60vg2b-et2msz-ln25\/35\/50\/60vg2v-a2msz-gzy09\/12\/18vfk_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e2msz-ay25\/35\/42\/50vgk-et1msz-ln18\/25\/35\/50\/60vg2b-e3msz-ay25\/35\/42\/50vgkp-et1msz-ay25\/35\/42\/50vgk-sc1msz-ef22\/25\/35\/42\/50vgkw-a1msz-ef18\/22\/25\/35\/42\/50vgks-e1_firmwaremsz-eza09\/12vakmsz-ef22\/25\/35\/42\/50vgks-et1msz-ln25\/35\/50\/60vg2r-et2_firmwaremsz-ft25\/35\/50vgk-sc1_firmwaremsz-rw25\/35\/50vg-sc1msz-ln25\/35\/50\/60vg2r-et3_firmwaremsz-ln25\/35\/50vg2w-en2_firmwaremfz-xt50\/60vfkmsz-ap25\/35\/42\/50vgk-e8_firmwaremsz-ef22\/25\/35\/42\/50vgkw-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e3_firmwaremsz-ln25\/35\/50\/60vg2v-et2_firmwaremsz-ln25\/35\/50\/60vg2v-et3msz-bt20\/25\/35\/50vgk-et3mac-587if-e_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e1_firmwaremsz-ay25\/35\/42\/50vgk-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e3msz-ln25\/35\/50\/60vg2b-a2_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-et1_firmwares-mac-002ifmsz-ef22\/25\/35\/42\/50vgks-a1msz-ln25\/35\/50vg2r-sc1_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-et1mfz-gxt50\/60\/73vfkmsz-ap25\/35\/42\/50vgk-en1msz-ap25\/35\/42\/50vgk-e1msz-ap25\/35\/42\/50\/60\/71vgk-e3_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et2msz-ln25\/35\/50\/60vg2v-er2_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-e1msz-ef22\/25\/35\/42\/50vgkw-er2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-a1_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-et3_firmwaremsz-ef22\/25\/35\/42\/50vgkw-er1msz-ft25\/35\/50vgk-e2msz-ln25\/35\/50vg2v-en2_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2msz-ef18\/22\/25\/35\/42\/50vgkw-e2msz-ay25\/35\/42\/50vgkp-sc1msz-ln18\/25\/35\/50\/60vg2w-et2_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er2msz-ln25\/35\/50\/60vg2r-a2msz-ln25\/35\/50vg2b-sc1_firmwaremsz-bt20\/25\/35\/50vgk-e1msz-zy09\/12\/18vfkmsz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2msz-ln25\/35\/50\/60vg2w-er3ma-ew85s-ukmsz-ln25\/35\/50\/60vg2r-er2msz-ln18\/25\/35\/50\/60vg2w-e3msz-ap25\/35\/42\/50vgk-et1_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-er1_firmwaremsz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1_firmwaremsz-bt20\/25\/35\/50vgk-e3msz-rw25\/35\/50vg-er1_firmwaremsz-ln25\/35\/50\/60vg2w-er3_firmwaremsz-ln25\/35\/50\/60vg2b-er3_firmwarema-ew85s-e_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1msz-ln18\/25\/35\/50\/60vg2r-e2_firmwaremsz-ay25\/35\/42\/50vgk-e1msz-rw25\/35\/50vg-er1msz-ln25\/35\/50\/60vg2v-et2msz-ef22\/25\/35\/42\/50vgkw-et2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e2msz-ln18\/25\/35\/50vg2w-sc1_firmwaremsz-ap25\/35\/42\/50vgk-en3_firmwaremsz-ay25\/35\/42\/50vgk-sc1_firmwaremsz-ft25\/35\/50vgk-et1_firmwaremsz-ln25\/35\/50vg2v-en2msz-bt20\/25\/35\/50vgk-et1_firmwaremac-587if-emsz-ln25\/35\/50vg2v-sc1msz-ln18\/25\/35\/50\/60vg2v-e2msz-ky09\/12\/18vfkmsz-ef22\/25\/35\/42\/50vgks-et2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e3_firmwaremsz-ln25\/35\/50vg2r-sc1msz-ef22\/25\/35\/42\/50vgkb-er2_firmwaremsz-zy09\/12\/18vfk_firmwaremsz-ap25\/35\/42\/50vgk-e8msz-ln25\/35\/50\/60vg2b-er2_firmwaremsz-ap25\/35\/42\/50vgk-en2_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et2msz-ln25\/35\/50\/60vg2b-a2msz-ap25\/35\/42\/50vgk-e1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e2_firmwaremsz-ln25\/35\/50vg2b-en2_firmwaremsz-ft25\/35\/50vgk-e1msz-ln18\/25\/35\/50\/60vg2w-e2msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2_firmwaremsz-ay25\/35\/42\/50vgkp-er1_firmwaremsz-eza09\/12vak_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-er3msz-ln18\/25\/35\/50vg2w-sc1msz-ef22\/25\/35\/42\/50vgkw-er2msz-exa09\/12vak_firmwaremsz-bt20\/25\/35\/50vgk-er1_firmwaremsz-ky09\/12\/18vfk_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET1Air Conditioning MSZ-AY25/35/42/50VGKP-ER1Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E1Air Conditioning MSZ-EF22/25/35/42/50VGKS-ER2Air Conditioning MSZ-LN18/25/35/50/60VG2W-E3Air Conditioning MSZ-LN25/35/50/60VG2V-ER2Air Conditioning MSZ-LN25/35/50/60VG2R-ER2Remote control with Wi-Fi Interface RMCB-D6SE-TAir Conditioning MSZ-LN25/35/50/60VG2R-ET2Air Conditioning MSZ-AY25/35/42/50VGKP-SC1Air Conditioning MSZ-LN25/35/50/60VG2V-ET3Air Conditioning MSZ-LN18/25/35/50/60VG2B-E3Remote control with Wi-Fi Interface RMCB-F6SE-TAir Conditioning MSZ-BT20/25/35/50VGK-E2Wi-Fi Interface GT-RA2Air Conditioning MSZ-EZA09/12VAKWi-Fi Interface GT-RA1Air Conditioning MSZ-HR25/35/42/50VFK-E6Air Conditioning MSZ-LN25/35/50/60VG2R-A2Air Conditioning MSZ-ZY09/12/18VFKAir Conditioning MSZ-LN25/35/50/60VG2W-ET3Mitsubishi Electric HEMS control adapter P-HM04WAAir Conditioning MSZ-AY25/35/42/50VGK-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET2Air Conditioning MSZ-LN25/35/50/60VG2R-ER3Air Conditioning MSZ-AP25/35/42/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ER3Air Conditioning MSZ-LN25/35/50/60VG2B-A2Air Conditioning MSZ-LN25/35/50VG2R-EN2Air Conditioning MSZ-FD40/56/63/71/8022SSmart Switch P-10SWRCAir Conditioning MSZ-RW25/35/50VG-ER1Remote control with Wi-Fi Interface RMCB-H6SE-TAir Conditioning MSZ-LN25/35/50/60VG2V-ET2Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9020(S)Air Conditioning MSZ-AP25/35/42/50VGK-E7Air Conditioning MSZ-AP22/25/35/42/50/60/71/80VGKD-A2Air Conditioning MSZ-AY25/35/42/50VGK-E6Air Conditioning MSZ-LN18/25/35/50/60VG2R-E3Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ER1Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ET2Refrigerator MR-WXD52/60/70GAir Conditioning MSZ-LN25/35/50/60VG2W-ER3Air Conditioning MSZ-EF22/25/35/42/50VGKS-A1Wi-Fi Interface MAC-588IF-EAir Conditioning MSZ-KY09/12/18VFKAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ER3Air Conditioning MSZ-BT20/25/35/50VGK-ER2Air Conditioning MSZ-EF22/25/35/42/50VGKS-ER1Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9021(S)Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ER2Air Conditioning MSZ-LN18/25/35/50/60VG2W-ET2Air Conditioning MSZ-RW25/35/50VG-E1Air Conditioning MSZ-HXV25/28/40/56/63/71/8022SAir Conditioning MSZ-EF22/25/35/42/50VGKB-ER2Air Conditioning MSZ-BT20/25/35/50VGK-ET3Air Conditioning MSZ-AP25/35/42/50VGK-EN2Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9021(S)Air Conditioning MSZ-AY25/35/42/50VGK-ER1Wi-Fi Interface GT-HR1Rice cooker NJ-AWBX10Smart Switch P-1600SWRCRefrigerator MR-WZ55/61HAir Conditioning MSZ-FZV40/56/63/71/80/9020SAir Conditioning MSZ-LN18/25/35/50VG2W-SC1Air Purifier MA-EW85S-EBATHROOM THERMO VENTILATOR WD-240DK2-RCBATHROOM THERMO VENTILATOR V-241BZ5-RCAir Conditioning MSZ-LN18/25/35/50/60VG2B-E2Air Conditioning MSZ-LN25/35/50/60VG2V-A2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E3Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E2Air Conditioning MFZ-GXT50/60/73VFKAir Conditioning MSZ-LN18/25/35/50/60VG2W-E2Air Conditioning MSZ-EF22/25/35/42/50VGKW-A1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ET1Smart Switch P-04SWRCBATHROOM THERMO VENTILATOR V-241BZ-RCAir Conditioning MSZ-LN18/25/35/50/60VG2W-ER2Air Conditioning MSZ-AP22/25/35/42/50/61/70/80VGKD-A1Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9021E9(S)Air Conditioning MSZ-BT20/25/35/50VGK-ET2Air Conditioning MSZ-FZ40/56/63/71/80/9021SAir Conditioning MSZ-AP25/35/42/50VGK-EN1Air Conditioning MSZ-LN25/35/50VG2V-SC1Air Conditioning MSZ-FT25/35/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ET3Air Conditioning MSZ-AP25/35/42/50/60/71VGK-E3Air Conditioning MSZ-FT25/35/50VGK-E2Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9020E8(S)Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E1Air Conditioning MSZ-BT20/25/35/50VGK-E3HEMS adapter GT-HEM4Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E2Wi-Fi Interface MAC-900IFAir Conditioning MSZ-LN25/35/50VG2B-SC1Refrigerator MR-MZ54/60HAir Conditioning MSZ-EF18/22/25/35/42/50VGKB-E1Air Conditioning MSZ-EF22/25/35/42/50VGKB-ER1Air Conditioning MSZ-FZV40/56/63/71/80/9021SAir Conditioning MSZ-EF18/22/25/35/42/50VGKS-E2Wi-Fi Interface PAC-SK43MLAir Conditioning MSZ-BT20/25/35/50VGK-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER2Air Conditioning MSZ-LN25/35/50VG2W-EN2Air Conditioning MSZ-LN25/35/50/60VG2V-ER3Air Conditioning MSZ-LN25/35/50/60VG2R-ET3Air Conditioning MSZ-AY25/35/42/50VGK-SC1Air Conditioning MFZ-XT50/60VFKAir Conditioning MSZ-AP25/35/42/50VGK-EN3BATHROOM THERMO VENTILATOR WD-240DK-RCAir Conditioning MSZ-BT20/25/35/50VGK-ER1Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET2Air Purifier MA-EW85S-UKAir Conditioning MSZ-BT20/25/35/50VGK-E1Air Conditioning MSZ-WX18/20/25VFKAir Conditioning MSZ-AP25/35/42/50VGK-E8Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-E2Energy Recovery Ventilator VL-200ZMHSV3-RCWi-Fi Interface MAC-587IF2-EAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ET3Air Conditioning MSZ-VXV40/56/63/71/8022SAir Conditioning MSZ-LN25/35/50VG2R-SC1Air Conditioning MSZ-LN25/35/50/60VG2B-ER2Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER1Air Conditioning MSZ-EXA09/12VAKAir Conditioning MSZ-GZY09/12/18VFKAir Conditioning MSZ-LN25/35/50/60VG2B-ET2Wi-Fi Interface MAC-587IF-EAir Conditioning MSZ-AY25/35/42/50VGKP-ET1Air Conditioning MSZ-RW25/35/50VG-ET1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-E1Air Conditioning MSZ-LN18/25/35/50/60VG2R-E2Air Conditioning MSZ-FZ40/56/63/71/80/9020SAir Conditioning MSZ-EF22/25/35/42/50VGKB-A1Air Conditioning MSZ-AP25/35/42/50VGK-ER1Wi-Fi Interface MAC-507IF-EAir Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9020(S)Wi-Fi Interface S-MAC-002IFAir Conditioning MSZ-EF22/25/35/42/50VGKS-ET1Air Conditioning MSZ-FT25/35/50VGK-SC2Air Conditioning MSZ-LN25/35/50VG2V-EN2Air Conditioning MSZ-AY25/35/42/50VGK-E1Air Conditioning MSY-GP10/13/15/18/20/24VFK-SG1Air Conditioning MSZ-FT25/35/50VGK-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E2Air Conditioning MSZ-FT25/35/50VGK-SC1Air Conditioning MSZ-AY25/35/42/50VGKP-E6Refrigerator MR-MXD50/57GAir Conditioning MSZ-AP25/35/42/50VGK-ET1Wi-Fi Interface P-WA01Air Conditioning MSZ-ZD25/28/40/56/63/71/8022(S)Air Conditioning MSZ-RW25/35/50VG-SC1Air Conditioning MSXY-FP05/07/10/13/18/20/24VGK-SG1Air Conditioning MSZ-LN25/35/50VG2B-EN2
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8866
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.18% / 39.82%
||
7 Day CHG~0.00%
Published-15 Sep, 2024 | 01:31
Updated-20 Sep, 2024 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AutoCMS robot.php cross site scripting

A vulnerability was found in AutoCMS 5.4. It has been classified as problematic. This affects an unknown part of the file /admin/robot.php. The manipulation of the argument sidebar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-autocms_projectn/aautocms
Product-autocmsAutoCMSautocms
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8735
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.48% / 81.14%
||
7 Day CHG~0.00%
Published-22 Nov, 2024 | 05:33
Updated-08 Apr, 2026 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MailMunch – Grow your Email List <= 3.1.8 - Reflected Cross-Site Scripting

The MailMunch – Grow your Email List plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.8. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-mailmunchmailmunch
Product-mailmunchMailMunch – Grow your Email List
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8800
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.99% / 83.78%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 07:35
Updated-08 Apr, 2026 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RabbitLoader – Website Speed Optimization for improving Core Web Vital metrics with Cache, Image Optimization, and more <= 2.21.0 - Reflected Cross-Site Scripting

The RabbitLoader – Website Speed Optimization for improving Core Web Vital metrics with Cache, Image Optimization, and more plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.21.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-yoginetworksanrlrabbitloader
Product-rabbitloaderRabbitLoader – AI Speed Optimization, Caching & CDN for WordPress & WooCommercerabbitloader
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-32209
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-6.1||MEDIUM
EPSS-5.48% / 90.27%
||
7 Day CHG+0.91%
Published-24 Jun, 2022 | 00:00
Updated-03 Nov, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```<%= sanitize @comment.body, tags: ["select", "style"] %>```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["select", "style"])```All users overriding the allowed tags by any of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).

Action-Not Available
Vendor-n/aFedora ProjectRuby on RailsDebian GNU/Linux
Product-fedoradebian_linuxrails_html_sanitizershttps://github.com/rails/rails-html-sanitizer
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8572
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.26% / 49.40%
||
7 Day CHG~0.00%
Published-08 Sep, 2024 | 08:00
Updated-11 Sep, 2024 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gouniverse GoLang CMS FrontendHandler.go PageRenderHtmlByAlias cross site scripting

A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.1 is able to address this issue. The patch is identified as 3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c. It is recommended to upgrade the affected component.

Action-Not Available
Vendor-gouniverseGouniverse
Product-golang_cmsGoLang CMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8549
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-1.24% / 79.42%
||
7 Day CHG~0.00%
Published-25 Sep, 2024 | 02:05
Updated-08 Apr, 2026 | 16:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Simple Calendar – Google Calendar Plugin <= 3.4.2 - Reflected Cross-Site Scripting

The Simple Calendar – Google Calendar Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.4.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-xtendifysimplecalendar
Product-simple_calendarSimple Calendar – Google Calendar Plugin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-31493
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 53.47%
||
7 Day CHG~0.00%
Published-06 Jun, 2022 | 18:18
Updated-03 Aug, 2024 | 07:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LibreHealth EHR Base 2.0.0 allows gacl/admin/acl_admin.php acl_id XSS.

Action-Not Available
Vendor-librehealthn/a
Product-librehealth_ehrn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-9205
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.80% / 86.22%
||
7 Day CHG~0.00%
Published-10 Oct, 2024 | 02:06
Updated-08 Apr, 2026 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Maximum Products per User for WooCommerce <= 4.2.8 - Reflected Cross-Site Scripting

The Maximum Products per User for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.2.8. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-wpfactorywpcodefactory
Product-maximum_products_per_user_for_woocommerceMaximum Products per User for WooCommerce
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-31495
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 53.47%
||
7 Day CHG~0.00%
Published-07 Jun, 2022 | 14:09
Updated-03 Aug, 2024 | 07:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LibreHealth EHR Base 2.0.0 allows gacl/admin/acl_admin.php return_page XSS.

Action-Not Available
Vendor-librehealthn/a
Product-librehealth_ehrn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-31454
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.10% / 26.19%
||
7 Day CHG~0.00%
Published-28 Jul, 2023 | 00:00
Updated-03 Aug, 2024 | 07:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Yii 2 v2.0.45 was discovered to contain a cross-site scripting (XSS) vulnerability via the endpoint /books. NOTE: this is disputed by the vendor because the cve-2022-31454-8e8555c31fd3 page does not describe why /books has a relationship to Yii 2.

Action-Not Available
Vendor-yiiframeworkn/a
Product-yiin/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8172
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.81%
||
7 Day CHG~0.00%
Published-26 Aug, 2024 | 16:00
Updated-28 Aug, 2024 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester QR Code Attendance System delete-student.php cross site scripting

A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Attendance System 1.0. This issue affects some unknown processing of the file /endpoint/delete-student.php. The manipulation of the argument student/attendance leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-remyandradeSourceCodester
Product-qr_code_attendance_systemQR Code Attendance Systemqr_code_attendance_system
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8208
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 31.43%
||
7 Day CHG~0.00%
Published-27 Aug, 2024 | 17:31
Updated-22 Apr, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
nafisulbari/itsourcecode Insurance Management System editClient.php cross site scripting

A vulnerability has been found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file editClient.php. The manipulation of the argument AGENT ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-nafisulbarinafisulbarinafisulbariITSourceCode
Product-life_insurance_management_systemInsurance Management Systeminsurance_management_system
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4454
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.31% / 54.46%
||
7 Day CHG~0.00%
Published-20 Nov, 2019 | 18:57
Updated-07 Aug, 2024 | 00:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting vulnerabilities in Tiki 8.0 RC1 and earlier allow remote attackers to inject arbitrary web script or HTML via the path info to (1) tiki-remind_password.php, (2) tiki-index.php, (3) tiki-login_scr.php, or (4) tiki-index.

Action-Not Available
Vendor-tikin/a
Product-tikin/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-5226
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.11% / 28.39%
||
7 Day CHG~0.00%
Published-11 Apr, 2026 | 01:24
Updated-24 Apr, 2026 | 18:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Optimole <= 4.2.3 - Reflected Cross-Site Scripting via Page Profiler URL

The Optimole – Optimize Images in Real Time plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URL paths in versions up to, and including, 4.2.3 This is due to insufficient output escaping on user-supplied URL paths in the get_current_url() function, which are inserted into JavaScript code via str_replace() without proper JavaScript context escaping in the replace_content() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-optimole
Product-Optimole – Optimize Images in Real Time
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-8786
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-2.58% / 85.68%
||
7 Day CHG~0.00%
Published-01 Oct, 2024 | 08:30
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Auto Featured Image from Title <= 2.3 - Reflected Cross-Site Scripting

The Auto Featured Image from Title plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-brochris
Product-Auto Featured Image from Title
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 207
  • 208
  • Next
Details not found