{"vulnerability": "CVE-2022-0680", "sightings": [{"uuid": "fd8bc102-a2fe-42c8-82ee-343658d87246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0680", "type": "seen", "source": "https://t.me/cibsecurity/39660", "content": "\u203c CVE-2022-0680 \u203c\n\nThe Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-28T22:41:46.000000Z"}]}