From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Name: HUSKY - Products Filter Professional for WooCommerce <= 1.3.6.3 - Reflected Cross-Site Scripting via really_curr_tax Parameter 2. Vulnerability Type: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 3. CVSS Score: 6.1 (Medium) 4. Public Release Date: November 19, 2024 5. Last Updated Date: November 19, 2024 6. Researcher: Daniel Scheidt - Vorwerk 7. Vulnerability Description: The HUSKY plugin contains a reflected Cross-Site Scripting (XSS) vulnerability when processing the parameter, which could allow unauthorized attackers to execute malicious scripts by tricking users into clicking on specially crafted links. 8. Reference Link: plugins.trac.wordpress.org 9. Remediation Recommendation: Update to version 1.3.6.4 or higher of the plugin. 10. Affected Versions: <= 1.3.6.3 11. Fixed Version: 1.3.6.4 12. Copyright Information: This record is copyrighted and published by Defiant Inc. and MITRE Corporation. 13. Vulnerability Database: Wordfence Intelligence’s WordPress vulnerability database is free and accessible via API for querying. 14. Notification Service: Users can receive the latest vulnerability notifications by installing the Wordfence plugin. 15. Documentation Links: Links to Wordfence plugin documentation and learning center are provided. This information helps users understand the details of the vulnerability and take appropriate actions to remediate and prevent exploitation.