404 to 301 <= 2.3.0 - Unauthenticated Stored Cross-Site Scripting (XSS)Sign up to our free email alerts service for instant vulnerability notifications!
There is a stored XSS in the 404-to-301 WP plugin < 2.3.1. Unauthenticated users can visit a specially crafted URL and the redirect path will be logged to the database. The redirection source is stored unescaped in the database, thus it is served as-is and evaluated in the browsers of logged-in admins when they check the redirection logs on http://wordpress/wp-admin/admin.php?page=i4t3-logs. Affected versions are <2.3.1.
|Proof of Concept||
fixed in version 2.3.1
|OWASP Top 10||A3: Cross-Site Scripting (XSS)|
|Publicly Published||2016-08-27 (almost 2 years ago)|
|Added||2016-08-29 (almost 2 years ago)|
|Last Updated||2016-11-08 (almost 2 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|