CVE-2008-1061

NUCLEI

Sniplets 1.1.2-1.2.2 - XSS

Title source: llm
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to (a) warning.php, (b) notice.php, and (c) inset.php in view/sniplets/, and possibly (d) modules/execute.php; the (2) url parameter to (e) view/admin/submenu.php; and the (3) page parameter to (f) view/admin/pager.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by NBBN · textwebappsphp
https://www.exploit-db.com/exploits/5194

Nuclei Templates (1)

WordPress Sniplets <=1.2.2 - Cross-Site Scripting
MEDIUMby dhiyaneshDK

References (6)

Core 6
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29099
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/40830
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5194
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/488734/100/0/threaded
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3706
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27985

Scores

EPSS 0.0016
EPSS Percentile 36.2%

Details

CWE
CWE-79
Status published
Products (2)
wordpress/sniplets_plugin 1.1.2
wordpress/sniplets_plugin 1.2.2
Published Feb 28, 2008
Tracked Since Feb 18, 2026