wordpress
Page content
- Author: voroskoi
- Vulnerable: 2.2.1-1terminus1
- Unaffected: 2.2.2-1terminus1
Benjamin Flesch has discovered a vulnerability in WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to the “style” parameter in wp-admin/upload.php (when “post_id” is set to a negative integer value) is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site. Successful exploitation requires that the target user has valid author or higher credentials.
- Bug Tracker URL: http://bugs.frugalware.org/task/2363