- Description
- Cross-site scripting (XSS) vulnerability in wpcommentremix.php in WP Comment Remix plugin before 1.4.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the (1) replytotext, (2) quotetext, (3) originallypostedby, (4) sep, (5) maxtags, (6) tagsep, (7) tagheadersep, (8) taglabel, and (9) tagheaderlabel parameters.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- nvd@nist.gov
- CWE-79
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pressography:wp_comment_remix_plugin:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "315D7262-1A75-4004-980F-DF7A4DEE3C5C",
"versionEndIncluding": "1.4.3"
},
{
"criteria": "cpe:2.3:a:pressography:wp_comment_remix_plugin:1.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D6CF79C4-B5D3-4C24-84DB-51455C622A8C"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]