Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33955 | The Add to Feedly WordPress plugin through 1.2.11 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. |
Fri, 10 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-01-10T17:37:01.076Z
Reserved: 2023-05-02T09:06:56.565Z
Link: CVE-2023-2470
Updated: 2024-08-02T06:26:08.544Z
Status : Modified
Published: 2023-05-30T08:15:10.337
Modified: 2025-01-10T18:15:19.233
Link: CVE-2023-2470
No data.
OpenCVE Enrichment
No data.
EUVD