CVE-2022-2072
25.07.2022, 13:15
The Name Directory WordPress plugin before 1.25.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. Furthermore, as the payload is also saved into the database after the request, it leads to a Stored XSS as well
Vendor | Product | Version |
---|---|---|
name_directory_project | name_directory | 𝑥 < 1.25.3 |
𝑥
= Vulnerable software versions