Stored XSS in the Strong Testimonials plugin before 2.40.1 for WordPress can result in an attacker performing malicious actions such as stealing session tokens.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://wpvulndb.com/vulnerabilities/10056 | third party advisory |
https://github.com/MachoThemes/strong-testimonials/blob/master/changelog.txt | third party advisory release notes |
https://www.getastra.com/blog/911/plugin-exploit/stored-xss-vulnerability-found-in-strong-testimonials-plugin/ | third party advisory exploit |
https://www.jinsonvarghese.com/stored-xss-vulnerability-in-strong-testimonials-plugin/ | third party advisory exploit |
http://packetstormsecurity.com/files/156369/WordPress-Strong-Testimonials-2.40.1-Cross-Site-Scripting.html | exploit vdb entry third party advisory |