Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
3dady
3dady real-time Web Stats Wordpress Wordpress wordpress |
|
| Vendors & Products |
3dady
3dady real-time Web Stats Wordpress Wordpress wordpress |
Sun, 10 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress 3dady real-time web stats plugin 1.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript by exploiting unsanitized input fields. Attackers can insert JavaScript payloads in the dady_input_text or dady2_input_text fields via the plugin options panel to execute arbitrary code when the page is viewed. | |
| Title | WordPress 3dady Real-Time Web Stats 1.0 Stored XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T14:55:00.435Z
Reserved: 2026-01-11T13:34:26.331Z
Link: CVE-2022-50945
Updated: 2026-05-11T14:54:57.476Z
Status : Deferred
Published: 2026-05-10T13:16:32.267
Modified: 2026-05-12T14:24:15.210
Link: CVE-2022-50945
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:23:59Z