Fahad Mahmood RSS Feed Widget Plugin v2.7.9 and lower does not sanitize the value of the "t" GET parameter before echoing it back out inside an input tag. This results in a reflected XSS vulnerability that attackers can exploit with a specially crafted URL.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/rss-feed-widget/advanced/ | Product Third Party Advisory |
https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ | Exploit Third Party Advisory URL Repurposed |
Configurations
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - Exploit, Third Party Advisory, URL Repurposed |
Information
Published : 2020-08-26 13:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-24314
Mitre link : CVE-2020-24314
CVE.ORG link : CVE-2020-24314
JSON object : View
Products Affected
rss_feed_widget_project
- rss_feed_widget
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')