| Vulnerability Name: | CCN-116671 | ||||||
| Published: | 2016-09-08 | ||||||
| Updated: | 2016-09-08 | ||||||
| Summary: | Wordpress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using the image file name field to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. | ||||||
| CVSS v3 Severity: | 5.4 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) 5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||
| CVSS v2 Severity: | 5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
| ||||||
| Vulnerability Consequences: | Cross-Site Scripting | ||||||
| References: | Source: CCN Type: Full-Disclosure Mailing List, Thu, 8 Sep 2016 19:26:01 +0200 Persistent Cross-Site Scripting vulnerability in WordPress due to unsafe processing of file names Source: XF Type: UNKNOWN wordpress-imagefile-xss(116671) Source: CCN Type: Packet Storm Security [09-09-2016] WordPress 4.5.3 Cross Site Scripting Source: CCN Type: Summer of Pwnage Web site Summer of Pwnage - Persistent Cross-Site Scripting vulnerability in WordPress due to unsafe processing of file names Source: CCN Type: WordPress Web site Blog Tool, Publishing Platform, and CMS WordPress | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||