Multiple cross-site scripting (XSS) vulnerabilities in the WP GuestMap plugin 1.8 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) zl, (2) mt, or (3) dc parameter to guest-locator.php; the (4) zl, (5) mt, (6) activate, or (7) dc parameter to online-tracker.php; the (8) zl, (9) mt, or (10) dc parameter to stats-map.php; or the (11) zl, (12) mt, (13) activate, or (14) dc parameter to weather-map.php.
References
Link | Resource |
---|---|
http://codevigilant.com/disclosure/wp-plugin-wp-guestmap-a3-cross-site-scripting-xss | Exploit |
http://www.securityfocus.com/bid/68403 | Exploit |
Configurations
History
No history.
Information
Published : 2014-07-02 18:55
Updated : 2024-02-04 18:35
NVD link : CVE-2014-4587
Mitre link : CVE-2014-4587
CVE.ORG link : CVE-2014-4587
JSON object : View
Products Affected
wp_guestmap_project
- wp_guestmap_project
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')