CVE-2017-20177
low-risk
Published 2023-02-06
A vulnerability, which was classified as problematic, has been found in WangGuard Plugin 1.8.0 on WordPress. Affected by this issue is the function wangguard_users_info of the file wangguard-user-info.php of the component WGG User List Handler. The manipulation of the argument userIP leads to cross site scripting. The attack may be launched remotely. The patch is identified as 88414951e30773c8d2ec13b99642688284bf3189. It is recommended to apply a patch to fix this issue. VDB-220214 is the identifier assigned to this vulnerability.
Do I need to act?
-
0.33% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.5/10
Low
NETWORK
/ LOW complexity
Affected Products (1)
Wangguard
Affected Vendors
References (8)
Issue Tracking
https://github.com/joseconti/WangGuard/pull/14
Permissions Required
https://vuldb.com/?ctiid.220214
Third Party Advisory
https://vuldb.com/?id.220214
Issue Tracking
https://github.com/joseconti/WangGuard/pull/14
Permissions Required
https://vuldb.com/?ctiid.220214
Third Party Advisory
https://vuldb.com/?id.220214
22
/ 100
low-risk
Severity
16/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal