Description
|
|
MustLive has discovered a vulnerability in the Wordfence plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed via the "email" POST parameter to e.g. index.php (when "_wfsf" is set to "unlockEmail") is not properly sanitised in wp-content/plugins/wordfence/lib/wordfenceClass.php before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerability is confirmed in version 3.3.5. Other versions may also affected.
|