Vigil@nce - WordPress How-Interest: Cross Site Scripting
September 2017 by CNIL
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Scripting of WordPress
How-Interest, in order to run JavaScript code in the context of
the web site.
Impacted products: WordPress Plugins not comprehensive.
Severity: 2/4.
Creation date: 11/07/2017.
DESCRIPTION OF THE VULNERABILITY
The How-Interest plugin can be installed on WordPress.
However, it does not filter received data before inserting them in
generated HTML documents.
An attacker can therefore trigger a Cross Site Scripting of
WordPress How-Interest, in order to run JavaScript code in the
context of the web site.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/WordPress-How-Interest-Cross-Site-Scripting-23196