cvelist/2023/0xxx/CVE-2023-0285.json
2023-02-21 09:00:38 +00:00

80 lines
2.4 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0285",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Real Media Library WordPress plugin before 4.18.29 does not sanitise and escape the created folder names, which could allow users with the role of author and above to perform Stored Cross-Site Scripting attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Real Media Library: Media Library Folder & File Manager",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.18.29"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348"
}
]
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Bipul Jaiswal from SecureLayer7"
},
{
"lang": "en",
"value": "WPScan"
}
]
}