header-logo
Suggest Exploit
vendor:
Pretty Link WordPress Plugin
by:
Unknown
7.5
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: Pretty Link WordPress Plugin
Affected Version From: 1.5.2002
Affected Version To: Unknown (other versions may also be affected)
Patch Exists: NO
Related CWE: Not provided
CPE: a:pretty_link:pretty_link:1.5.2
Metasploit:
Other Scripts:
Platforms Tested: WordPress (platform), Windows, Linux, Mac
Unknown

Cross-Site Scripting in Pretty Link WordPress Plugin

The Pretty Link plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Mitigation:

Update to the latest version of the Pretty Link plugin to ensure that user-supplied input is properly sanitized. Regularly monitor for updates and security advisories from the plugin vendor.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/50921/info

The Pretty Link plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Pretty Link 1.5.2 is vulnerable; other versions may also be affected. 

 http://www.example.com/[path]/wp-content/plugins/pretty-link/pretty-bar.php?url=[xss]