CVE-2013-4241

MEDIUM

Hitmyserver Hms Testimonials < 2.0.11 - XSS

Title source: rule
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in the HMS Testimonials plugin before 2.0.11 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) image, (3) url, or (4) testimonial parameter to the Testimonial form (hms-testimonials-addnew page); (5) date_format parameter to the Settings - Default form (hms-testimonials-settings page); (6) name parameter in a Save action to the Settings - Custom Fields form (hms-testimonials-settings-fields page); or (7) name parameter in a Save action to the Settings - Template form (hms-testimonials-templates-new page).

Exploits (1)

exploitdb WORKING POC VERIFIED
by RogueCoder · textwebappsphp
https://www.exploit-db.com/exploits/27531

References (5)

Core 5
Core References
Mailing List, Third Party Advisory x_refsource_misc
http://seclists.org/oss-sec/2013/q3/361
Exploit, Mailing List, Third Party Advisory x_refsource_misc
http://seclists.org/fulldisclosure/2013/Aug/96
Exploit, Mailing List, Third Party Advisory x_refsource_misc
http://seclists.org/fulldisclosure/2013/Aug/98
Mailing List, Third Party Advisory x_refsource_misc
http://seclists.org/oss-sec/2013/q3/345

Scores

CVSS v3 6.1
EPSS 0.0204
EPSS Percentile 83.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (1)
hitmyserver/hms_testimonials < 2.0.11
Published Jan 30, 2020
Tracked Since Feb 18, 2026