Description
WordPress is prone to a prototype pollution vulnerability. Exploiting this issue could allow an attacker to inject key/value �properties� into JavaScript objects, potentially allowing for execution of arbitrary JavaScript in a user�s session if they can trick that user into clicking a link. WordPress versions 4.3.x ranging from 4.3 and up to (and including) 4.3.27 are vulnerable.
Remediation
Update to WordPress version 4.3.28 or latest
References
https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md
https://wordpress.org/support/wordpress-version/version-4-3-28/
Related Vulnerabilities
WordPress 4.6.x Multiple Vulnerabilities (4.6 - 4.6.19)
WordPress Plugin ProfileGrid-User Profiles, Groups and Communities Cross-Site Scripting (4.7.4)
WordPress Plugin Universal Star Rating Unspecified Vulnerability (1.10.3)
WordPress Plugin Safe Redirect Manager SQL Injection (1.7.7)
Jboss EAP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-6311)