wordpress
Page content
- Author: Miklos Vajna
- Vulnerable: 3.2.1-1
- Unaffected: 3.3.1-1mores1
Aditya Modha and Samir Shah discovered a vulnerability in WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the URL to e.g. wp-comments-post.php is not properly sanitised within the “wp_guess_url()” function in wp-includes/functions.php before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.
- Bug Tracker URL: https://bugs.frugalware.org/ticket/4644