The GiveWP WordPress plugin before 2.17.3 does not sanitise and escape the form_id parameter before outputting it back in the response of an unauthenticated request via the give_checkout_login AJAX action, leading to a Reflected Cross-Site Scripting
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/87a64b27-23a3-40f5-a3d8-0650975fee6f | third party advisory exploit |
https://plugins.trac.wordpress.org/changeset/2659032 | third party advisory release notes |