The plugin does not sanitise and escape the iowd_tabs_active parameter before rendering it in the plugin admin panel, leading to a reflected Cross-Site Scripting vulnerability, allowing an attacker to trick a logged in admin to execute arbitrary javascript by clicking a link.
Make a logged in admin open https://example.com/wp-admin/admin.php?page=iowd_settings&msg;=1&iowd;_tabs_active=generalry8uo"><img src%3Da onerror%3Dalert(1)>f0cmo
CPE | Name | Operator | Version |
---|---|---|---|
image-optimizer-wd | lt | 1.0.27 |