Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Powie's WHOIS Domain Check 0.9.31 contains a persistent cross-site scripting vulnerability that allows authenticated attackers to inject arbitrary JavaScript by exploiting unsanitized input fields in plugin settings. Attackers can submit malicious payloads through textarea and input elements in the pwhois_settings.php configuration page to execute JavaScript in the admin context and escalate privileges. | |
| Title | Powie's WHOIS Domain Check 0.9.31 Persistent Cross-Site Scripting | |
| First Time appeared |
Powie
Powie pfile |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:powie:pfile:0.9.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Powie
Powie pfile |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-13T18:32:41.272Z
Reserved: 2026-05-13T14:16:30.648Z
Link: CVE-2020-37225
Updated: 2026-05-13T18:32:33.516Z
Status : Deferred
Published: 2026-05-13T16:16:34.127
Modified: 2026-05-13T17:07:21.030
Link: CVE-2020-37225
No data.
OpenCVE Enrichment
Updated: 2026-05-13T17:15:26Z