Google XML Sitemaps <= 4.0.8 - Authenticated Reflected XSS (via HOST header)Sign up to our free email alerts service for instant vulnerability notifications!
The plugin contains a Paypal donate button that is echoing the global variable HTTP_HOST, which can be manipulated by the visitor. Vulnerable Code: sitemap-ui.php L1310 echo 'http://' . $_SERVER['HTTP_HOST']...
fixed in version 4.0.9
|OWASP Top 10||A3: Cross-Site Scripting (XSS)|
|Publicly Published||2017-03-01 (over 1 year ago)|
|Added||2017-03-03 (over 1 year ago)|
|Last Updated||2017-07-26 (about 1 year ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|