Vulnerability Description
The Fattura24 WordPress plugin before 6.2.8 does not sanitize or escape the 'id' parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fattura24 | Fattura24 | < 6.2.8 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/aa868380-cda7-4ec6-8a3f-d9fa692908f2ExploitThird Party Advisory
- https://wpscan.com/vulnerability/aa868380-cda7-4ec6-8a3f-d9fa692908f2ExploitThird Party Advisory
FAQ
What is CVE-2023-5211?
CVE-2023-5211 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Fattura24 WordPress plugin before 6.2.8 does not sanitize or escape the 'id' parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting vulnerability.
How severe is CVE-2023-5211?
CVE-2023-5211 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5211?
Check the references section above for vendor advisories and patch information. Affected products include: Fattura24 Fattura24.