Edge Side Include injection (ESI Injection) is a vulnerability that allows an attacker to reflect ESI tags in the HTTP response.
The ESI language is based on a small set of XML tags and is used in many popular HTTP surrogate solutions to tackle performance issues by enabling heavy caching of Web content. ESI tags are used to instruct a reverse-proxy (or a caching server) to fetch more information about a web page for which a template is already cached. If an attacker can successfully reflect ESI tags in the HTTP response, then the surrogate will blindly parse and evaluate them, believing they are legitimate tags that are served from the upstream server.
- Apply context-dependent encoding and/or validation to user input rendered on a page. Mitigation techniques against XSS recommended for the language or framework you are using will often be enough to protect against ESI injections.
- WordPress Plugin Custom Banners Cross-Site Scripting (184.108.40.206)
- WordPress Plugin WP Ad Guru Lite Cross-Site Scripting (1.6.0)
- WordPress Plugin Count per Day Arbitrary File Download and Cross-Site Scripting Vulnerabilities (3.1)
- WordPress Plugin Live Streaming/Broadcast Live Video Cross-Site Scripting (4.27.2)
- WordPress Plugin Multi Step Form Multiple Cross-Site Scripting Vulnerabilities (1.2.5)