Exploit Report

Computer Security And Bug Information


CVE Title
Published Date2023-03-06T06:15Z
Modified Date2023-03-10T22:43Z
CWE TypeCWE-79
DescriptionA vulnerability was found in Qtranslate Slug Plugin up to 1.1.16. It has been classified as problematic. Affected is the function add_slug_meta_box of the file includes/class-qtranslate-slug.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.1.17 is able to address this issue. The name of the patch is 74b3932696f9868e14563e51b7d0bb68c53bf5e4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222324.
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/wp-plugins/qtranslate-slug/commit/74b3932696f9868e14563e51b7d0bb68c53bf5e4
Reference DescriptionMISC https://github.com/wp-plugins/qtranslate-slug/commit/74b3932696f9868e14563e51b7d0bb68c53bf5e4
Reference URLhttps://vuldb.com/?id.222324
Reference DescriptionMISC https://vuldb.com/?id.222324
Reference URLhttps://github.com/wp-plugins/qtranslate-slug/releases/tag/1.1.17
Reference DescriptionMISC https://github.com/wp-plugins/qtranslate-slug/releases/tag/1.1.17
Reference URLhttps://vuldb.com/?ctiid.222324
Reference DescriptionMISC https://vuldb.com/?ctiid.222324

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles