mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
48 lines
1.7 KiB
JSON
48 lines
1.7 KiB
JSON
{
|
|
"id": "CVE-2024-13113",
|
|
"sourceIdentifier": "contact@wpscan.com",
|
|
"published": "2025-02-26T13:15:36.710",
|
|
"lastModified": "2025-02-26T16:15:15.020",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Countdown Timer for Elementor WordPress plugin before 1.3.7 does not sanitise and escape some parameters when outputting them on the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El complemento Countdown Timer for Elementor de WordPress anterior a la versi\u00f3n 1.3.7 no depura ni escapa algunos par\u00e1metros al mostrarlos en la p\u00e1gina, lo que podr\u00eda permitir que los usuarios con un rol tan bajo como colaborador realicen ataques de cross site scripting."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
|
"baseScore": 5.9,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW"
|
|
},
|
|
"exploitabilityScore": 1.7,
|
|
"impactScore": 3.7
|
|
}
|
|
]
|
|
},
|
|
"references": [
|
|
{
|
|
"url": "https://wpscan.com/vulnerability/ffc31d9d-d245-4c4b-992d-394a01798117/",
|
|
"source": "contact@wpscan.com"
|
|
}
|
|
]
|
|
} |