Edge Side Include injection (ESI Injection) is a vulnerability that allows an attacker to reflect ESI tags in the HTTP response.
The ESI language is based on a small set of XML tags and is used in many popular HTTP surrogate solutions to tackle performance issues by enabling heavy caching of Web content. ESI tags are used to instruct a reverse-proxy (or a caching server) to fetch more information about a web page for which a template is already cached. If an attacker can successfully reflect ESI tags in the HTTP response, then the surrogate will blindly parse and evaluate them, believing they are legitimate tags that are served from the upstream server.
Apply context-dependent encoding and/or validation to user input rendered on a page. Mitigation techniques against XSS recommended for the language or framework you are using will often be enough to protect against ESI injections.
WordPress Plugin Church Admin Cross-Site Scripting (0.800)
WordPress Plugin qTranslate X Multiple Cross-Site Scripting Vulnerabilities (22.214.171.124)
Joomla! Core Cross-Site Scripting (1.7.0 - 3.9.5)
WordPress Plugin Widgets on Pages Cross-Site Scripting (1.6.0)
WordPress Plugin Event Calendar WD-Responsive Event Calendar Cross-Site Scripting (1.1.23)