An XSS vulnerability in the WP Lead Plus X plugin through 0.98 for WordPress allows logged-in users with minimal permissions to create or replace existing pages with a malicious page containing arbitrary JavaScript via the wp_ajax_core37_lp_save_page (aka core37_lp_save_page) AJAX action.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.wordfence.com/blog/2020/04/critical-vulnerabilities-in-the-wp-lead-plus-x-wordpress-plugin/ | Exploit Third Party Advisory | 
| https://www.wordfence.com/blog/2020/04/critical-vulnerabilities-in-the-wp-lead-plus-x-wordpress-plugin/ | Exploit Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2020-04-07 19:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11508
Mitre link : CVE-2020-11508
CVE.ORG link : CVE-2020-11508
JSON object : View
Products Affected
                wpleadplus
- wp_lead_plus_x
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
