WordPress 3dady real-time web stats plugin 1.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript by exploiting unsanitized input fields. Attackers can insert JavaScript payloads in the dady_input_text or dady2_input_text fields via the plugin options panel to execute arbitrary code when the page is viewed.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 10 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress 3dady real-time web stats plugin 1.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript by exploiting unsanitized input fields. Attackers can insert JavaScript payloads in the dady_input_text or dady2_input_text fields via the plugin options panel to execute arbitrary code when the page is viewed. | |
| Title | WordPress 3dady Real-Time Web Stats 1.0 Stored XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:12:46.043Z
Reserved: 2026-01-11T13:34:26.331Z
Link: CVE-2022-50945
No data.
Status : Received
Published: 2026-05-10T13:16:32.267
Modified: 2026-05-10T13:16:32.267
Link: CVE-2022-50945
No data.
OpenCVE Enrichment
Updated: 2026-05-10T13:30:12Z
Weaknesses