Description
Cross-site scripting (XSS) vulnerability in the CommentLuv plugin before 2.92.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the _ajax_nonce parameter to wp-admin/admin-ajax.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by High-Tech Bridge · textwebappsphp
https://www.exploit-db.com/exploits/38296
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/89925
Exploit x_refsource_misc
http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html
Product x_refsource_misc
http://wordpress.org/plugins/commentluv/changelog
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2013-02/0031.html
Exploit x_refsource_misc
https://www.htbridge.com/advisory/HTB23138
Scores
EPSS
0.0338
EPSS Percentile
87.5%
Details
CWE
CWE-79
Status
published
Products (50)
commentluv/commentluv
2.7
commentluv/commentluv
2.71
commentluv/commentluv
2.74
commentluv/commentluv
2.76
commentluv/commentluv
2.80
commentluv/commentluv
2.81
commentluv/commentluv
2.81.1
commentluv/commentluv
2.81.2
commentluv/commentluv
2.81.3
commentluv/commentluv
2.81.4
... and 40 more
Published
Mar 03, 2014
Tracked Since
Feb 18, 2026