Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3
Critical0
High0
Medium3
Reset
Showing 1-3 of 3 records
Threat Entry Updated 2024-11-21

CVE-2023-5560 - Wp Useronline Plugin

The WP-UserOnline WordPress plugin before 2.88.3 does not sanitise and escape the X-Forwarded-For header before outputting its content on the page, which allows unauthenticated users to perform Cross-Site Scripting attacks.

PLUGIN Wp Useronline

CVE-2023-5560

MEDIUM CVSS 6.1 2023-11-27
Threat Entry Updated 2025-05-05

CVE-2022-2941 - Wp Useronline Plugin

The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions up to, and including 2.88.0. This is due to the fact that all fields in the "Naming Conventions" section do not properly sanitize user input, nor escape it on output. This makes it possible for authenticated attackers, with administrative privileges, to inject JavaScript code into the setting that will execute whenever a user accesses the injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Wp Useronline

CVE-2022-2941

MEDIUM CVSS 5.5 2022-09-06
Threat Entry Updated 2025-05-05

CVE-2022-2473 - Wp Useronline Plugin

The WP-UserOnline plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘templates[browsingpage][text]' parameter in versions up to, and including, 2.87.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative capabilities and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The only affects multi-site installations and installations where unfiltered_html is disabled.

PLUGIN Wp Useronline

CVE-2022-2473

MEDIUM CVSS 5.5 2022-09-06
Scroll to top