Description
|
|
Kacper Szurek has reported a vulnerability in the Shareaholic plugin for WordPress, which can be exploited by malicious users to conduct script insertion attacks.
Input passed via the "location[id]" POST parameter to wp-admin/admin-ajax.php (when "action" is set to "shareaholic_add_location") is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site if malicious data is viewed.
The vulnerability is reported in versions prior to 7.6.1.0.
|