Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43852 | The tagDiv Composer WordPress plugin before 4.2, used as a companion by the Newspaper and Newsmag themes from tagDiv, does not have authorisation in a REST route and does not validate as well as escape some parameters when outputting them back, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks. |
Thu, 26 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:tagdiv:tagdiv_composer:*:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-09-26T15:51:45.513Z
Reserved: 2023-06-08T18:39:59.929Z
Link: CVE-2023-3169
Updated: 2024-08-02T06:48:07.816Z
Status : Modified
Published: 2023-09-11T20:15:09.713
Modified: 2024-11-21T08:16:36.763
Link: CVE-2023-3169
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD