First published: Mon Feb 21 2022(Updated: )
The GiveWP WordPress plugin before 2.17.3 does not sanitise and escape the form_id parameter before outputting it back in the response of an unauthenticated request via the give_checkout_login AJAX action, leading to a Reflected Cross-Site Scripting
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Givenu Givenu Give | <2.17.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-25099.
The severity level of CVE-2021-25099 is medium (6.1).
The affected software version of CVE-2021-25099 is GiveWP WordPress plugin before 2.17.3.
The CWE ID associated with CVE-2021-25099 is CWE-79.
To fix the vulnerability in GiveWP WordPress plugin, update to version 2.17.3 or later.