CVE-2017-15811

The Pootle Button plugin before 1.2.0 for WordPress has XSS via the assets_url parameter in assets/dialog.php, exploitable via wp-admin/admin-ajax.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pootlepress:pootle_button:1.0.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:pootlepress:pootle_button:1.1.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:pootlepress:pootle_button:1.1.1:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 03:15

Type Values Removed Values Added
References () https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html - Third Party Advisory, VDB Entry () https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html - Third Party Advisory, VDB Entry
References () https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/ - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags/ - Patch, Third Party Advisory
References () https://wpvulndb.com/vulnerabilities/8930 - Third Party Advisory () https://wpvulndb.com/vulnerabilities/8930 - Third Party Advisory

Information

Published : 2017-10-23 17:29

Updated : 2024-11-21 03:15


NVD link : CVE-2017-15811

Mitre link : CVE-2017-15811

CVE.ORG link : CVE-2017-15811


JSON object : View

Products Affected

pootlepress

  • pootle_button
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')