First published: Wed May 07 2025(Updated: )
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Paterson Time Clock allows Stored XSS. This issue affects Time Clock: from n/a through 1.2.3.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Scott Paterson Time Clock | <=1.2.3 | |
WordPress Time Clock | <=1.2.3 |
Update the WordPress Time Clock plugin to the latest available version (at least 1.3).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-47516 has a critical severity level due to the potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2025-47516, upgrade Scott Paterson Time Clock to version 1.2.4 or later.
CVE-2025-47516 affects Scott Paterson Time Clock versions up to and including 1.2.3.
CVE-2025-47516 can be exploited for stored XSS attacks, allowing attackers to inject malicious scripts.
CVE-2025-47516 is specific to both Scott Paterson Time Clock and WordPress Time Clock applications.