header-logo
Suggest Exploit
vendor:
Processing Embed plugin for Wordpress
by:
Unknown
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: Processing Embed plugin for Wordpress
Affected Version From: 0.5
Affected Version To: 0.5
Patch Exists: NO
Related CWE:
CPE: a:processing_embed:processing_embed:0.5
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Cross-Site Scripting Vulnerability in Processing Embed plugin for WordPress

The Processing Embed plugin for Wordpress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Mitigation:

The vendor has not provided a patch or mitigation for this vulnerability. It is recommended to disable or remove the affected plugin until a fix is available.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/45266/info

The Processing Embed plugin for Wordpress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

WordPress Processing Embed plugin 0.5 is vulnerable; other versions may also be affected. 

http://www.example.com/wordpress/wp-content/plugins/wordpress-processing-embed/data/popup.php?pluginurl=%3Cscript%3Ealert(0)%3C/script%3E