Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.debian.org/security/2017/dsa-3997 | vendor advisory |
http://www.securityfocus.com/bid/100912 | vdb entry third party advisory |
https://core.trac.wordpress.org/changeset/41393 | patch vendor advisory |
http://www.securitytracker.com/id/1039553 | vdb entry |
https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/ | release notes patch vendor advisory |