CVE-2022-0680
28.03.2022, 18:15
The Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue
Vendor | Product | Version |
---|---|---|
plezi | plezi | 𝑥 < 1.0.3 |
𝑥
= Vulnerable software versions