WordPress Plugin Vulnerabilities
Connections <= 8.5.8 - Reflected Cross-Site Scripting (XSS)
Description
Line 320 contains unfiltered user input for the search field
being sent directly via echo back to the users browser via the ’s’ variable.
In file includes/admin/pages/manage.php
Line 320:
<input type="search" id="entry-search-input" name="s" value="<?php if (
isset( $_GET['s'] ) && ! empty( $_GET['s'] )) echo $_GET['s'] ; ?>" />
Affects Plugins
References
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Submitter
firefart
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2016-02-02 (about 10 years ago)
Added
2016-02-02 (about 10 years ago)
Last Updated
2021-01-19 (about 5 years ago)