The plugin does not sanitise and escape various parameters before outputting them back in some pages such as the user dashboard, leading to a Reflected Cross-Site Scripting
Open the following URL when authenticated (as any user): https://example.com/user-dashboard/?search=keyword:<img%20src=1%20onerror=alert(/XSS/)>
Felipe Tapia Sasot
Felipe Tapia Sasot
Yes
2022-02-16 (about 1 years ago)
2022-02-16 (about 1 years ago)
2022-04-08 (about 1 years ago)