Description
WordPress Plugin Trashbin is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
Related Vulnerabilities
Joomla! Core 3.x.x Multiple Cross-Site Request Forgery Vulnerabilities (3.0.0 - 3.9.14)
WordPress Plugin sourceAFRICA Cross-Site Scripting (0.1.3)
MediaWiki Other Vulnerability (CVE-2021-36126)
Oracle Application Server Other Vulnerability (CVE-2007-0286)
Oracle Application Server Other Vulnerability (CVE-2009-0217)