First published: Mon Sep 25 2023(Updated: )
The Ditty WordPress plugin before 3.1.25 does not sanitise and escape some parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metaphor Creations Ditty | <3.1.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of the Ditty WordPress plugin vulnerability is CVE-2023-4148.
The severity level of CVE-2023-4148 is medium.
The affected software is the Ditty WordPress plugin before version 3.1.25.
The CWE number of CVE-2023-4148 is 79.
The vulnerability can be exploited through Reflected Cross-Site Scripting attacks, which could be used against high privilege users such as admin.