Wordfence Plugin for WordPress 'email' Parameter XSS

medium Nessus Plugin ID 63064

Synopsis

The remote web server hosts a PHP script that is affected by a cross- site scripting vulnerability.

Description

The version of the Wordfence plugin for WordPress installed on the remote host fails to properly sanitize user-supplied input to the 'email' parameter in the lib/wordfenceClass.php script. An unauthenticated, remote attacker can exploit this issue, via a specially crafted request, to execute arbitrary script code in a user's browser session.

Solution

Upgrade to Wordfence Plugin version 3.3.7 or later

See Also

https://seclists.org/fulldisclosure/2012/Oct/139

https://www.wordfence.com/

Plugin Details

Severity: Medium

ID: 63064

File Name: wordpress_wordfence_email_xss.nasl

Version: 1.12

Type: remote

Published: 11/27/2012

Updated: 6/6/2024

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 10/19/2012

Vulnerability Publication Date: 10/18/2012

Reference Information

BID: 56159

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990