A vulnerability, which was classified as problematic, was found in WDS Multisite Aggregate Plugin up to 1.0.0 on WordPress. Affected is the function update_options of the file includes/WDS_Multisite_Aggregate_Options.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.1 is able to address this issue. The name of the patch is 49e0bbcb6ff70e561365d9e0d26426598f63ca12. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-233364.
More Stories
mingw-python-jinja2-3.1.5-1.fc40
FEDORA-2025-5f04326f4f Packages in this update: mingw-python-jinja2-3.1.5-1.fc40 Update description: Update to jinja2-3.1.5. Read More
mingw-python-jinja2-3.1.5-1.fc41
FEDORA-2025-dbe19a2b1f Packages in this update: mingw-python-jinja2-3.1.5-1.fc41 Update description: Update to jinja2-3.1.5. Read More
seamonkey-2.53.20-2.el8
FEDORA-EPEL-2025-ef6b6c8d41 Packages in this update: seamonkey-2.53.20-2.el8 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
seamonkey-2.53.20-2.fc40
FEDORA-2025-4945eb6eeb Packages in this update: seamonkey-2.53.20-2.fc40 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
seamonkey-2.53.20-2.fc41
FEDORA-2025-135cf1b7f3 Packages in this update: seamonkey-2.53.20-2.fc41 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
USN-7189-1: HTMLDOC vulnerabilities
It was discovered that HTMLDOC incorrectly handled certain inputs, which could lead to an integer overflow. An attacker could potentially...