CVE-2023-32119 Vulnerability Details
/
/
/
CVE-2023-32119 Metadata Quick Info
CVE Published: 23/08/2023 |
CVE Updated: 25/09/2024 |
CVE Year: 2023
Source: Patchstack |
Vendor: WPO365 |
Product: WPO365 | Mail Integration for Office 365 / Outlook
Status : PUBLISHED
CVE-2023-32119 Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPO365 | Mail Integration for Office 365 / Outlook plugin <= 1.9.0 versions.
Metrics
CVSS Version: 3.1 |
Base Score: 5.8 MEDIUM
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
l➤ Exploitability Metrics:
Attack Vector (AV)* NETWORK
Attack Complexity (AC)* HIGH
Privileges Required (PR)* NONE
User Interaction (UI)* REQUIRED
Scope (S)* CHANGED
l➤ Impact Metrics:
Confidentiality Impact (C)* LOW
Integrity Impact (I)* LOW
Availability Impact (A)* LOW
Weakness Enumeration (CWE)
CWE-ID: CWE-79
CWE Name: CWE-79 Improper Neutralization of Input During Web Page Generation (
Cross-site Scripting
)
Source: WPO365
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID: CAPEC-591
CAPEC Description: CAPEC-591 Reflected XSS
Source: NVD (National Vulnerability Database).