mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
18 lines
767 B
Markdown
18 lines
767 B
Markdown
### [CVE-2024-5032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5032)
|
|

|
|

|
|
&color=brighgreen)
|
|
|
|
### Description
|
|
|
|
The SULly WordPress plugin before 4.3.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://wpscan.com/vulnerability/4bb92693-23b3-4250-baee-af38b7e615e0/
|
|
|
|
#### Github
|
|
No PoCs found on GitHub currently.
|
|
|