Fahad Mahmood RSS Feed Widget Plugin v2.7.9 and lower does not sanitize the value of the "t" GET parameter before echoing it back out inside an input tag. This results in a reflected XSS vulnerability that attackers can exploit with a specially crafted URL.
References
| Link | Resource |
|---|---|
| https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ | Exploit Third Party Advisory |
| https://wordpress.org/plugins/rss-feed-widget/advanced/ | Product Third Party Advisory |
Configurations
Information
Published : 2020-08-26 06:15
Updated : 2020-09-03 12:03
NVD link : CVE-2020-24314
Mitre link : CVE-2020-24314
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
rss_feed_widget_project
- rss_feed_widget


