Input validation vulnerability in Comment Extra Fields 1.7
Severity: medium-risk
Status: Open
Publication: August 1, 2013
The Comment Extra Fields plugin for WordPress, up to version 1.7, is vulnerable to Cross-Site Scripting. This means that attackers can inject malicious web scripts in a victim’s browser that can be executed. This is caused by the plugin not properly sanitizing the inputs or escaping the outputs of the swfupload.swf file.
This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
Home » Vulnerabilities » Input validation vulnerability in Comment Extra Fields 1.7
Latest
Passkeys: no need for Limit Login Attempts?
Configuring Really Simple Security with WP-CLI
How to Fix The “Link you followed has Expired” error on WordPress
404 not found errors
Protecting site visitors with Security Headers
Hardening your website’s security
Input validation vulnerability in Comment Extra Fields 1.7
The Comment Extra Fields plugin for WordPress, up to version 1.7, is vulnerable to Cross-Site Scripting. This means that attackers can inject malicious web scripts in a victim’s browser that can be executed. This is caused by the plugin not properly sanitizing the inputs or escaping the outputs of the swfupload.swf file.
Detected in:
This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:
> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21
Is this information incorrect? Please leave us a message.