The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.
References
Configurations
Configuration 1 (hide)
|
History
25 Jul 2024, 14:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://wordpress.org/plugins/social-warfare/#developers - Product | |
References | () https://wpvulndb.com/vulnerabilities/9238 - Broken Link, Third Party Advisory |
Information
Published : 2019-03-24 15:29
Updated : 2024-07-25 14:57
NVD link : CVE-2019-9978
Mitre link : CVE-2019-9978
CVE.ORG link : CVE-2019-9978
JSON object : View
Products Affected
warfareplugins
- social_warfare_pro
- social_warfare
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')