Description
WordPress Plugin http:BL is prone to multiple vulnerabilities, including cross-site scripting and cross-site request forgery vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks or to perform certain administrative actions and gain unauthorized access to the affected application. WordPress Plugin http:BL version 1.9.1 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised and CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
Related Vulnerabilities
WordPress Plugin Multicons [Multiple Favicons] Cross-Site Scripting (2.1)
Internet Information Services Improper Authentication Vulnerability (CVE-2009-1535)
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-6211)
WordPress Plugin Classified Listing Pro & Directory Cross-Site Scripting (2.0.19)
WordPress Plugin WP-UserOnline Cross-Site Scripting (2.87.6)