Fahad Mahmood RSS Feed Widget Plugin v2.7.9 and lower does not sanitize the value of the "t" GET parameter before echoing it back out inside an input tag. This results in a reflected XSS vulnerability that attackers can exploit with a specially crafted URL.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/rss-feed-widget/advanced/ | Product Third Party Advisory |
https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ | Exploit Third Party Advisory URL Repurposed |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-08-26T12:59:49
Updated: 2020-08-26T12:59:49
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-24314
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-08-26T13:15:10.987
Modified: 2024-02-14T01:17:43.863
Link: CVE-2020-24314
JSON object: View
Redhat Information
No data.
CWE