Cross-site scripting (XSS) vulnerability in feedlist/handler_image.php in the FeedList plugin 2.61.01 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://secunia.com/advisories/42197 | third party advisory vendor advisory |
http://packetstormsecurity.org/1011-exploits/wpfeedlist-xss.txt | |
http://www.johnleitch.net/Vulnerabilities/WordPress.Feed.List.2.61.01.Reflected.Cross-site.Scripting/56 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/63055 | vdb entry |
http://osvdb.org/69071 | vdb entry exploit |