Description
WordPress MU is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. WordPress MU versions prior to 2.7 are vulnerable.
Remediation
Update to WordPress MU version 2.7 or latest
References
http://www.exploit-db.com/exploits/8196/
http://www.securityfocus.com/archive/1/501667
http://packetstormsecurity.org/files/view/75622/wordpressmuhost-xss.txt
Related Vulnerabilities
Joomla! Core Security Bypass (2.5.0 - 3.9.18)
Joomla! Core 3.x.x Directory Traversal (3.2.0 - 3.4.5)
WordPress Plugin Event Single Page Templates Addon For The Events Calendar Security Bypass (1.5)
Oracle Database Server Other Vulnerability (CVE-2007-5513)
Moodle Improper Input Validation Vulnerability (CVE-2018-1137)