GHSA-9j2p-8qqf-h55c

Suggest an improvement
Source
https://github.com/advisories/GHSA-9j2p-8qqf-h55c
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-9j2p-8qqf-h55c/GHSA-9j2p-8qqf-h55c.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9j2p-8qqf-h55c
Aliases
Published
2023-02-13T21:31:03Z
Modified
2024-02-16T08:09:42.301197Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Cross-site Scripting in UDX Stateless Media Plugin
Details

A vulnerability was found in UDX Stateless Media Plugin 3.1.1. It has been declared as problematic. This vulnerability affects the function setupwizardinterface of the file lib/classes/class-settings.php. The manipulation of the argument settings leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.2.0 is able to address this issue. The name of the patch is 6aee7ae0b0beeb2232ce6e1c82aa7e2041ae151a. It is recommended to upgrade the affected component. VDB-220750 is the identifier assigned to this vulnerability.

Database specific
{
    "nvd_published_at": "2023-02-13T21:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-02-23T22:11:03Z"
}
References

Affected packages

Packagist / wpcloud/wp-stateless

Package

Name
wpcloud/wp-stateless
Purl
pkg:composer/wpcloud/wp-stateless

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.0

Affected versions

1.*

1.5
1.6.0
1.7.0
1.7.1
1.7.2
1.7.3
1.8.0
1.9.0
1.9.2

v2.*

v2.0
v2.0.0-rc1
v2.1-RC-1

2.*

2.0.1
2.0.2
2.0.3
2.1.0
2.1.1
2.1.2-rc1
2.1.2
2.1.3
2.1.4
2.1.5-RC1
2.1.5-RC2
2.1.5-RC3
2.1.5
2.1.6-RC1
2.1.6-RC2
2.1.6-RC3
2.1.6-RC4
2.1.6
2.1.7-RC1
2.1.7
2.1.8-beta-2
2.1.8-beta-3
2.1.8-RC1
2.1.8-RC2
2.1.8-RC3
2.1.8-RC4
2.1.8-rc5
2.1.8-rc6
2.1.8
2.1.9
2.2.0-beta.1
2.2.0
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
2.2.6
2.2.7
2.3.0
2.3.1
2.3.2.RC1
2.3.2-RC.2
2.3.2-RC.3
2.3.2
2.3.3-RC.1
2.3.3-RC.2
2.3.3
2.4.0-RC.1
2.4.0-RC.2
2.4.0-RC.3
2.4.0-RC.4

3.*

3.0
3.0.1
3.0.2
3.0.3
3.0.4
3.1.0
3.1.1