CVSS Base Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
Detection Type: Remote Banner
Solution Type: Vendor Patch
Summary: The WordPress plugin WebP Express is prone to a stored cross-site scripting (XSS) vulnerability.
Detection Method: Checks if a vulnerable version is present on the target host.
Impact: Successful exploitation would allow an authenticated attacker to
Affected Versions: WordPress WebP Express plugin through version 0.14.7.
Recommendations: Update to version 0.14.8 or later.
Web application abuses
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
Debian Security Advisory DSA 4545-1 (mediawiki - security update)
Debian LTS Advisory ([SECURITY] [DLA 1966-1] aspell security update)
Debian LTS Advisory ([SECURITY] [DLA 1965-1] nfs-utils security update)
Apache HTTP Server Memory Access Vulnerability (Windows)
Apache HTTP Server Memory Access Vulnerability (Linux)
Apache HTTP Server Multiple Vulnerabilities (Windows)
Apache HTTP Server Multiple Vulnerabilities (Linux)
Apache HTTP Server Stack Overflow Vulnerability (Windows)
Apache HTTP Server Stack Overflow Vulnerability (Linux)
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.