Powie's WHOIS Domain Check 0.9.31 contains a persistent cross-site scripting vulnerability that allows authenticated attackers to inject arbitrary JavaScript by exploiting unsanitized input fields in plugin settings. Attackers can submit malicious payloads through textarea and input elements in the pwhois_settings.php configuration page to execute JavaScript in the admin context and escalate privileges.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Powie's WHOIS Domain Check 0.9.31 contains a persistent cross-site scripting vulnerability that allows authenticated attackers to inject arbitrary JavaScript by exploiting unsanitized input fields in plugin settings. Attackers can submit malicious payloads through textarea and input elements in the pwhois_settings.php configuration page to execute JavaScript in the admin context and escalate privileges. | |
| Title | Powie's WHOIS Domain Check 0.9.31 Persistent Cross-Site Scripting | |
| First Time appeared |
Powie
Powie pfile |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:powie:pfile:0.9.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Powie
Powie pfile |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-13T14:22:35.764Z
Reserved: 2026-05-13T14:16:30.648Z
Link: CVE-2020-37225
No data.
Status : Deferred
Published: 2026-05-13T16:16:34.127
Modified: 2026-05-13T17:07:21.030
Link: CVE-2020-37225
No data.
OpenCVE Enrichment
Updated: 2026-05-13T17:15:26Z
Weaknesses