Description


The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key

Weaknesses


Could not find any weaknesses

CVSS impact metrics


CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

4.7 · Medium

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2023-02-02T08:15:08.403Z

2 years ago

Last modified

2025-03-26T14:15:38.557Z

10 months ago