Google XML Sitemaps <= 4.0.8 - Authenticated Reflected XSS (via HOST header)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The plugin contains a Paypal donate button that is echoing the global variable HTTP_HOST, which can be manipulated by the visitor.

Vulnerable Code:

sitemap-ui.php L1310
echo 'http://' . $_SERVER['HTTP_HOST']...

Affects

Plugin google-sitemap-generator
fixed in version 4.0.9

References

URL https://plugins.trac.wordpress.org/browser/google-sitemap-generator/trunk/sitemap-ui.php#L1310

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter Gerard Arall
Views 688
Verified No
WPVDB ID 8762

Timeline

Publicly Published 2017-03-01 (6 months ago)
Added 2017-03-03 (6 months ago)
Last Updated 2017-07-26 (26 days ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.