WordPress Plugin Vulnerabilities

Connections <= 8.5.8 - Reflected Cross-Site Scripting (XSS)

Description

Line 320 contains unfiltered user input for the search field
being sent directly via echo back to the users browser via the ’s’ variable.

In file includes/admin/pages/manage.php
Line 320:
<input type="search" id="entry-search-input" name="s" value="<?php if (
isset( $_GET['s'] ) && ! empty( $_GET['s'] )) echo $_GET['s'] ; ?>" />

Affects Plugins

Fixed in 8.5.9

References

Classification

Type
XSS
CWE

Miscellaneous

Submitter
firefart
Submitter website
Submitter twitter
Verified
No

Timeline

Publicly Published
2016-02-02 (about 10 years ago)
Added
2016-02-02 (about 10 years ago)
Last Updated
2021-01-19 (about 5 years ago)

Other