Description
WordPress Plugin Comment Rating is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker could leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could allow the attacker to steal cookie-based authentication credentials and launch other attacks. WordPress Plugin Comment Rating version 2.9.20 is vulnerable; other versions may also be affected.
Remediation
Update to the latest version
References
http://www.securityfocus.com/bid/51241/exploit
http://packetstormsecurity.com/files/108314/wpcommentrating-sqlxss.txt
Related Vulnerabilities
Apache Tomcat Deserialization of Untrusted Data Vulnerability (CVE-2020-9484)
Grafana Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2021-27962)
WordPress Plugin BetterDocs-Best Documentation & Knowledge Base Cross-Site Scripting (1.9.1)
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-22201)
WordPress Plugin Events Shortcodes For The Events Calendar Security Bypass (1.9.4)