cvelist/2023/6xxx/CVE-2023-6046.json

80 lines
2.4 KiB
JSON
Raw Normal View History

2023-11-09 04:00:33 +00:00
{
2024-01-16 16:00:40 +00:00
"data_version": "4.0",
2023-11-09 04:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6046",
2024-01-16 16:00:40 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2023-11-09 04:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-16 16:00:40 +00:00
"value": "The EventON WordPress plugin before 2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored HTML Injection attacks even when the unfiltered_html capability is disallowed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "EventON",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "2.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/97f1d403-ae96-4c90-8d47-9822f4d68033/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/97f1d403-ae96-4c90-8d47-9822f4d68033/"
2023-11-09 04:00:33 +00:00
}
]
2024-01-16 16:00:40 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Miguel Santareno"
},
{
"lang": "en",
"value": "WPScan"
}
]
2023-11-09 04:00:33 +00:00
}