Description
This script is possibly vulnerable to Cross Site Scripting (XSS) attacks via the Host header.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser.
Acunetix cannot fully determine if this vulnerability is exploitable, however it verified that the Host header is reflected in the response body and that a part of the Location header can be manipulated via user input.This vulnerability must be investigated and confirmed manually.
Remediation
Your script should filter metacharacters from user input.
References
Acunetix Cross Site Scripting Attack
VIDEO: How Cross-Site Scripting (XSS) Works
Related Vulnerabilities
WordPress Plugin WP Photo Album Plus Cross-Site Scripting (6.1.2)
WordPress Plugin SEO Smart Links Cross-Site Scripting (3.0.1)
WordPress Plugin Uploader Cross-Site Scripting and Arbitrary File Upload Vulnerabilities (1.0.4)
WordPress Plugin DMCA WaterMarker Cross-Site Scripting (1.0)
WordPress Plugin Spryng Payments for WooCommerce Cross-Site Scripting (1.6.7)