The wpbrutalai WordPress plugin before 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb | third party advisory vdb entry exploit technical description |
http://packetstormsecurity.com/files/173734/WordPress-WP-Brutal-AI-Cross-Site-Scripting.html | third party advisory vdb entry exploit |