cve/2022/CVE-2022-0680.md

18 lines
817 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-0680](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0680)
![](https://img.shields.io/static/v1?label=Product&message=Plezi&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.0.0%3E%3D%201.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue
### POC
#### Reference
- https://wpscan.com/vulnerability/7cede02e-9af7-4f50-95a8-84ef4c7f7ded
#### Github
No PoCs found on GitHub currently.