Summary
This host is running WordPress with Xili Language plugin and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow remote attackers to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
Update to Xili Language Plugin version 2.8.5 or later, For updates refer to http://wordpress.org/extend/plugins/xili-language
Insight
The input passed via 'lang' parameter to index.php script is not properly validated.
Affected
WordPress Xili Language Plugin version 2.8.4.3 and prior
References
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- Aardvark Topsites PHP 'index.php' Multiple Cross Site Scripting Vulnerabilities
- Apache Archiva Cross Site Request Forgery Vulnerability
- AjaXplorer Remote Command Injection and Local File Disclosure Vulnerabilities
- Annuaire PHP 'sites_inscription.php' Cross Site Scripting Vulnerability
- Adobe JRun Management Console Multiple Vulnerabilities