WP Mobile Detector <= 3.2 - Stored Cross-Site Scripting (XSS)Sign up to our free email alerts service for instant vulnerability notifications!
The WP Mobile Detector plugin exposes the AJAX action ‘websitez_options’ to all registered users on line 78 of wp-mobile-detector/websitez-wp-mobile-detector.php. Providing specially crafted form values will result in a Persistent XSS attack on Mobile visitors.
|Proof of Concept||
fixed in version 3.3
|OWASP Top 10||A3: Cross-Site Scripting (XSS)|
|Publicly Published||2015-06-25 (about 3 years ago)|
|Added||2015-06-25 (about 3 years ago)|
|Last Updated||2015-06-25 (about 3 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|