The leenkme plugin before 2.6.0 for WordPress has stored XSS via facebook_message, facebook_linkname, facebook_caption, facebook_description, default_image, or _wp_http_referer.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://wpvulndb.com/vulnerabilities/8457 | third party advisory |
https://wordpress.org/plugins/leenkme/#developers | release notes |
https://www.openwall.com/lists/oss-security/2016/04/16/4 | mailing list exploit third party advisory |