WF-66b6443a-3bd0-4f45-8ad3-424d11ec24e1-no-page-comment
No Page Comment <= 1.1 - Reflected Cross-Site Scripting
mediumImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
6.1
CVSS Score
6.1
CVSS Score
medium
Severity
1.2
Patched in
489d
Time to patch
Description
The No Page Comment plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via $_SERVER['REQUEST_URI'], which is echoed to a form in versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is not likely to be exploitable in modern browsers.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NAttack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Low
Confidentiality
Low
Integrity
None
Availability
Technical Details
Affected versions
<=1.1PublishedSeptember 21, 2022
Last updatedJanuary 22, 2024
Affected pluginno-page-comment
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.