Description The plugin does not sanitise and escape various parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Make a logged in admin open one of the URLs below (some require that at least one property exist in the plugin): https://example.com/wp-admin/edit.php?post_type=properties&“> https://example.com/wp-admin/edit.php?post_type=propertiesℴ=”> (other affected parameter: orderby) https://example.com/wp-admin/admin.php?page=es_demo&">
CPE | Name | Operator | Version |
---|---|---|---|
eq | 4.1.1 |