
If an authenticated user who is able to edit Wordpress PHP Code in any kind, clicks the malicious link, PHP code can be edited. These actions include stealing the users account by changing their password or allowing attackers to submit their own code through an authenticated user resulting in Remote Code Execution.

A successful exploitation incomibantion with CSRF could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. The vulnerability is due to insufficient sanitization of the "data-frmverify" tag for links in the web-based entry inspection page of affected systems. If the Link gets clicked, Javascript code can be executed. The HTML-injection may trick authenticated users to follow the link. Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in WordPress WP Google Maps plugin (versions, and.This could allow an unauthenticated, remote attacker to exploit a HTML-injection byinjecting a malicous link.
CURRENT VERSION PLUGIN PDF BROWSER PLUGIN 2.4.4 UPDATE
Reflected Cross-Site Scripting (XSS) vulnerability in Cimatti Consulting WordPress Contact Forms by Cimatti plugin mass update settings, manage subscriptions > add a new subscription, update subscription, delete Subscription.Ĭross-Site Request Forgery (CSRF) leading to Stored Cross-Site Scripting (XSS) in Mufeng's Hermit 音 乐 播 放 器 plugin &attributes, Name > &attributes, &icons, &names, &description, &link, &title. There are no known workarounds for this vulnerability. Users are advised to upgrade to version 1.0.2. There is potential for a Cross Site Request Forgery for all form blocks, since it allows to send requests to the forms from any website without a user noticing.

Versions prior to 1.0.2 are subject to a Cross-Site Request Forgery due to a missing nonce check. Form block is a wordpress plugin designed to make form creation easier.
