Description
WordPress Plugin Comment Rating is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker could leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could allow the attacker to steal cookie-based authentication credentials and launch other attacks. WordPress Plugin Comment Rating version 2.9.20 is vulnerable; other versions may also be affected.
Remediation
Update to the latest version
References
http://www.securityfocus.com/bid/51241/exploit
http://packetstormsecurity.com/files/108314/wpcommentrating-sqlxss.txt
Related Vulnerabilities
PHP Out-of-bounds Read Vulnerability (CVE-2016-9935)
Apache Tomcat Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-12615)
WordPress Plugin Discount Rules for WooCommerce Security Bypass (2.2.0)
WordPress Plugin Eventify-Simple Events 'npath' Parameter Remote File Include (1.7.g)