Title: WordPress MiwoFTP Plugin 1.0.5 Multiple CSRF XSS Vulnerabilities
Advisory ID: ZSL-2015-5241
Impact: Cross-Site Scripting
Release Date: 14.04.2015
MiwoFTP is a smart, fast and lightweight file manager plugin that operates from the back-end of WordPress.
MiwoFTP WP Plugin suffers from multiple cross-site request forgery and xss vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several GET/POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Miwisoft LLC - <http://www.miwisoft.com>
Apache 2.4.10 (Win32)
[24.03.2015] Vulnerability discovered.
[25.03.2015] Vendor contacted.
[25.03.2015] Vendor responds asking more details.
[26.03.2015] Sent details to the vendor.
[27.03.2015] Vendor forwarded details to developers.
[30.03.2015] Vendor confirms vulnerability scheduling patch by end of week.
[31.03.2015] Replied to the vendor.
[09.04.2015] Asked vendor for status update.
[12.04.2015] No reply from the vendor.
[13.04.2015] Asked vendor for status update.
[13.04.2015] Vendor replies promising patch by end of week.
[14.04.2015] Vendor releases version 1.0.6 to address these issues.
[14.04.2015] Coordinated public security advisory released.
Vulnerability discovered by Gjoko Krstic - <email@example.com>
[14.04.2015] - Initial release
[16.04.2015] - Added reference , ,  and 
[22.04.2015] - Added reference  and 
Zero Science Lab
REQUEST LIMIT REACHED