Description
|
|
A vulnerability has been discovered in the WP-FaceThumb plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed to the "pagination_wp_facethumb" parameter in index.php (when "p" is set to the id of the WP-FaceThumb Gallery) is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerability is confirmed in version 0.1. Other versions may also be affected.
|