Summary
This host is running Category Grid View Gallery plugin and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is caused due to an input validation error in the 'ID' parameter in '/wp-content/plugins/category-grid-view-gallery/includes/CatGridPost.php' when processing user-supplied data.
Affected
WordPress Category Grid View Gallery Plugin version 2.3.1 and prior
Detection
Send the crafted XSS query via HTTP GET nethod and confirm the vulnerability from the response.
References
Severity
Classification
-
CVE CVE-2013-4117 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache CouchDB Cross Site Request Forgery Vulnerability
- Adiscon LogAnalyzer 'highlight' Parameter Cross Site Scripting Vulnerability
- AbanteCart Multiple Cross-Site Scripting Vulnerabilities
- AfterLogic WebMail Pro Multiple Cross Site Scripting Vulnerabilities
- APC PowerChute Network Shutdown HTTP Response Splitting Vulnerability