From this webpage screenshot, the following key vulnerability information can be obtained: 1. Vulnerability Name: Organization chart <= 1.5.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting via title_input and node_description Parameters 2. Rating: 4.9 (Medium) 3. CVE ID: CVE-2024-7355 4. CVSS Score: 4.9 (Medium) 5. Public Release Date: August 7, 2024 6. Update Date: August 7, 2024 7. Researcher: Norbert Hofmann 8. Affected Versions: <= 1.5.0 9. Fixed Version: 1.5.1 10. Vulnerability Type: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) 11. Vulnerability Description: This vulnerability allows an attacker with subscriber-level privileges to inject malicious scripts via the title_input and node_description parameters, enabling execution of arbitrary code. 12. Reference Links: plugins.trac.wordpress.org, wordpress.org, plugins.trac.wordpress.org 13. Sharing Options: Facebook, Twitter, LinkedIn, Email 14. Copyright Information: Copyright 2012–2024 Defiant Inc. and Copyright 1999–2024 The MITRE Corporation. 15. Vulnerability Database: Wordfence Intelligence Vulnerability Database 16. Vulnerability Notifications: Latest vulnerability notifications can be obtained by installing the Wordfence plugin. 17. Documentation: Additional information on how to use the Wordfence plugin and API is available on the Wordfence documentation page. This information helps users understand the details of the vulnerability and how to protect their websites from such attacks using the Wordfence plugin.