WP Plugin Rednumber Admin Menu v1.1 and lower does not sanitize the value of the "role" GET parameter before echoing it back out to the user. This results in a reflected XSS vulnerability that attackers can exploit with a specially crafted URL.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ | url repurposed third party advisory exploit |
https://wordpress.org/plugins/admin-menu/ | third party advisory release notes |