NewStatPress <= 1.0.4 - Reflected Cross-Site Scripting (XSS)Sign up to our free email alerts service for instant vulnerability notifications!
The NewStatPress plugin utilizes on lines 28 and 31 of the file ‘includes/nsp_search.php’ several variables from the $_GET scope, without sanitation. While WordPress automatically escapes quotes on this scope, the outputs on these lines are outside of quotes, and as such can be utilized to trigger a Reflected XSS attack.
|Proof of Concept||
fixed in version 1.0.6
|OWASP Top 10||A3: Cross-Site Scripting (XSS)|
|Publicly Published||2015-07-07 (almost 3 years ago)|
|Added||2015-07-07 (almost 3 years ago)|
|Last Updated||2015-07-07 (almost 3 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|