Description
Multiple cross-site scripting (XSS) vulnerabilities in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to (a) warning.php, (b) notice.php, and (c) inset.php in view/sniplets/, and possibly (d) modules/execute.php; the (2) url parameter to (e) view/admin/submenu.php; and the (3) page parameter to (f) view/admin/pager.php.
Exploits (1)
Nuclei Templates (1)
WordPress Sniplets <=1.2.2 - Cross-Site Scripting
MEDIUMby dhiyaneshDK
References (6)
Core 6
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29099
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/40830
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5194
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/488734/100/0/threaded
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3706
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27985
Scores
EPSS
0.0016
EPSS Percentile
36.2%
Details
CWE
CWE-79
Status
published
Products (2)
wordpress/sniplets_plugin
1.1.2
wordpress/sniplets_plugin
1.2.2
Published
Feb 28, 2008
Tracked Since
Feb 18, 2026