Description
This script is possibly vulnerable to Cross Site Scripting (XSS) attacks via the Host header.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser.
Acunetix cannot fully determine if this vulnerability is exploitable, however it verified that the Host header is reflected in the response body and that a part of the Location header can be manipulated via user input.This vulnerability must be investigated and confirmed manually.
Remediation
Your script should filter metacharacters from user input.
References
Acunetix Cross Site Scripting Attack
VIDEO: How Cross-Site Scripting (XSS) Works
Related Vulnerabilities
WordPress Plugin Breezing Forms Cross-Site Scripting (1.2.7.33)
WordPress Plugin WP No External Links Cross-Site Scripting (3.5.15)
WordPress Plugin Adminer Cross-Site Scripting (1.4.2)
WordPress Plugin Style It Cross-Site Scripting (1.0)
WordPress Plugin NextGEN Gallery-WordPress Gallery 'xml/media-rss.php' Cross-Site Scripting (1.5.1)