Cross-site scripting (XSS) vulnerability in the userphoto_options_page function in user-photo.php in the User Photo plugin before 0.9.5.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to wp-admin/options-general.php. NOTE: some of these details are obtained from third party information.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://plugins.trac.wordpress.org/changeset?old_path=%2Fuser-photo&old=541880&new_path=%2Fuser-photo&new=541880 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75496 | vdb entry |
http://osvdb.org/81806 | vdb entry |
http://www.securityfocus.com/bid/53449 | vdb entry |
http://secunia.com/advisories/49100 | third party advisory vendor advisory |
http://wordpress.org/extend/plugins/user-photo/changelog/ |