CVE-2020-24314

Fahad Mahmood RSS Feed Widget Plugin v2.7.9 and lower does not sanitize the value of the "t" GET parameter before echoing it back out inside an input tag. This results in a reflected XSS vulnerability that attackers can exploit with a specially crafted URL.
References
Link Resource
https://wordpress.org/plugins/rss-feed-widget/advanced/ Product Third Party Advisory
https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ Exploit Third Party Advisory URL Repurposed
Configurations

Configuration 1 (hide)

cpe:2.3:a:rss_feed_widget_project:rss_feed_widget:*:*:*:*:*:wordpress:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - Exploit, Third Party Advisory (MISC) https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - Exploit, Third Party Advisory, URL Repurposed

Information

Published : 2020-08-26 13:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-24314

Mitre link : CVE-2020-24314

CVE.ORG link : CVE-2020-24314


JSON object : View

Products Affected

rss_feed_widget_project

  • rss_feed_widget
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')