A reflected XSS vulnerability was found in includes/admin/table-printer.php in the broken-link-checker (aka Broken Link Checker) plugin 1.11.8 for WordPress. This allows unauthorized users to inject client-side JavaScript into an admin-only WordPress page via the wp-admin/tools.php?page=view-broken-links s_filter parameter in a search action.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154875/WordPress-Broken-Link-Checker-1.11.8-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Oct/31 | Exploit Mailing List Third Party Advisory |
https://wordpress.org/plugins/broken-link-checker/#developers | Product |
https://wpvulndb.com/vulnerabilities/9917 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-10-18 16:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-17207
Mitre link : CVE-2019-17207
CVE.ORG link : CVE-2019-17207
JSON object : View
Products Affected
managewp
- broken_link_checker
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')