
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the tagDiv Newspaper theme 10.3.9.1 for WordPress. It allows Cross-Site Scripting (XSS) via the wp-admin/admin-ajax.php tdblockid parameter in a tdajaxblock API call (NVD, CVE).
The vulnerability is classified as CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It has a CVSS v3.1 Base Score of 6.1 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating that it is network accessible, requires low attack complexity, needs no privileges, but requires user interaction (NVD).
The vulnerability allows attackers to execute cross-site scripting attacks through the tdblockid parameter, potentially compromising user data and website security (WPScan).
The vulnerability was fixed in Newspaper theme version 11. Users are advised to upgrade to version 11 or later to mitigate this security issue (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."