Wordfence Plugin for WordPress 'email' Parameter XSS

medium Nessus Plugin ID 63064

Synopsis

The remote web server hosts a PHP script that is affected by a cross- site scripting vulnerability.

Description

The version of the Wordfence plugin for WordPress installed on the remote host fails to properly sanitize user-supplied input to the 'email' parameter in the lib/wordfenceClass.php script. An unauthenticated, remote attacker can exploit this issue, via a specially crafted request, to execute arbitrary script code in a user's browser session.

Solution

Upgrade to Wordfence Plugin version 3.3.7 or later

See Also

https://seclists.org/fulldisclosure/2012/Oct/139

https://www.wordfence.com/

Plugin Details

Severity: Medium

ID: 63064

File Name: wordpress_wordfence_email_xss.nasl

Version: 1.11

Type: remote

Published: 11/27/2012

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 10/19/2012

Vulnerability Publication Date: 10/18/2012

Reference Information

BID: 56159

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990