WordPress Plugin Vulnerabilities

WP Floating Menu < 1.4.1 - Authenticated Reflected Cross-Site Scripting

Description

The id GET parameter used by WP Floating menu does not correctly sanitise user input before reflecting the parameter back to the user, resulting in a reflected XSS vulnerability.

Other sanitisation have been added to prevent other XSS issues as well as potential SQL injections.

Proof of Concept

Affects Plugins

Fixed in 1.4.1

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
ZeroAptitude
Verified
No

Timeline

Publicly Published
2020-08-31 (about 5 years ago)
Added
2020-08-31 (about 5 years ago)
Last Updated
2020-09-16 (about 5 years ago)

Other