Description
WordPress Plugin Affiliate Press is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. WordPress Plugin Affiliate Press version 0.3.8 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
http://www.vapidlabs.com/wp/wp_advisory.php?v=1376
http://www.vapidlabs.com/wp/wp_advisory.php?v=1377
http://www.vapidlabs.com/wp/wp_advisory.php?v=730
http://www.vapidlabs.com/wp/wp_advisory.php?v=731
http://blog.portswigger.net/2007/03/exploiting-xss-in-post-requests.html
Related Vulnerabilities
WordPress Plugin AP Companion includes Backdoor [Only if downloaded via the vendor website] (1.0.6)
WordPress Plugin Resize Image After Upload Cross-Site Request Forgery (1.8.5)
WordPress Plugin Contus HD FLV Player 'process-sortable.php' SQL Injection (1.3)
WordPress Plugin MAC PHOTO GALLERY Multiple Security Bypass Vulnerabilities (3.0)
IBM RTC Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-6131)