[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f_1hK-asZXFgBLDcQnguImeHG5mOp7GbQG2lvpoK2PCE":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-11685","kudos-donations-easy-donations-and-payments-with-mollie-reflected-cross-site-scripting-via-addqueryarg","Kudos Donations – Easy donations and payments with Mollie \u003C= 3.2.9 - Reflected Cross-Site Scripting via 'add_query_arg'","The `Kudos Donations – Easy donations and payments with Mollie` plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of `add_query_arg` without appropriate escaping on the URL in all versions up to, and including, 3.2.9. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute if they can successfully trick a user into performing an action, such as clicking on a specially crafted link.","kudos-donations",null,"\u003C=3.2.9","3.3.0","medium",6.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2024-11-27 00:00:00","2024-11-28 09:08:21",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fb02b5ea6-e112-4255-833c-87ee939986b0?source=api-prod",1]