header-logo
Suggest Exploit
vendor:
WordPress
by:
7.5
CVSS
HIGH
Cross-Site Scripting, HTML Injection, SQL Injection
79
CWE
Product Name: WordPress
Affected Version From:
Affected Version To:
Patch Exists: YES
Related CWE:
CPE: a:wordpress:wordpress
Metasploit:
Other Scripts:
Platforms Tested:

Multiple Cross-Site Scripting, HTML Injection, and SQL Injection Vulnerabilities in WordPress

WordPress is vulnerable to multiple cross-site scripting, HTML injection, and SQL injection vulnerabilities. These vulnerabilities arise due to a lack of proper sanitization of user-supplied data. The cross-site scripting and HTML injection vulnerabilities allow remote attackers to create malicious URI links or post data that includes hostile HTML and script code. If the victim user follows the malicious link or views resulting pages, the hostile code may be rendered in their web browser, potentially leading to the theft of authentication credentials or other attacks. The SQL injection vulnerabilities can be exploited to manipulate SQL queries and may result in the theft of sensitive information and data corruption.

Mitigation:

To mitigate these vulnerabilities, it is recommended to update WordPress to the latest version, ensure proper input validation and sanitization of user-supplied data, and implement strong access controls to protect against SQL injection attacks. Additionally, users should be cautious when following links from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11984/info
 
Wordpress is reported vulnerable to multiple cross-site scripting, HTML injection, and SQL injection vulnerabilities. These issues are due to a lack of proper sanitization of user-supplied data.
 
The cross-site scripting and HTML injection issues could permit a remote attacker to create a malicious URI link, or post data to the affected application that includes hostile HTML and script code. If this link were to be followed, or resulting pages were to be viewed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
 
An attacker may exploit the SQL injection issues to manipulate SQL queries to the underlying database. This may facilitate theft of sensitive information, potentially including authentication credentials, and data corruption.

http://www.example.com/wp-admin/templates.php?file=[XSS]