Vulnerability CVE-2013-4241


Published: 2020-01-30   Modified: 2020-01-31

Description:
Multiple cross-site scripting (XSS) vulnerabilities in the HMS Testimonials plugin before 2.0.11 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) image, (3) url, or (4) testimonial parameter to the Testimonial form (hms-testimonials-addnew page); (5) date_format parameter to the Settings - Default form (hms-testimonials-settings page); (6) name parameter in a Save action to the Settings - Custom Fields form (hms-testimonials-settings-fields page); or (7) name parameter in a Save action to the Settings - Template form (hms-testimonials-templates-new page).

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Hitmyserver -> Hms testimonials 

 References:
http://seclists.org/fulldisclosure/2013/Aug/96
http://seclists.org/fulldisclosure/2013/Aug/98
http://seclists.org/oss-sec/2013/q3/345
http://seclists.org/oss-sec/2013/q3/361
https://wordpress.org/plugins/hms-testimonials/#developers

Copyright 2024, cxsecurity.com

 

Back to Top