Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, directory traversal and open redirect vulnerabilities because it fails to properly sanitize/verify user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, to obtain sensitive information that could aid in further attacks, or to redirect users to arbitrary web sites and conduct phishing attacks. WordPress versions 3.8.x ranging from 3.8 and up to (and including) 3.8.21 are vulnerable.
Remediation
Update to WordPress version 3.8.22 or latest
References
https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
https://medium.com/websec/wordpress-sqli-poc-f1827c20bf8e
https://blog.sucuri.net/2017/09/stored-cross-site-scripting-vulnerability-in-wordpress-4-8-1.html
Related Vulnerabilities
WordPress Plugin Citizen Space Cross-Site Scripting (1.0)
WebLogic CVE-2020-2963 Vulnerability (CVE-2020-2963)
WordPress Plugin WebP Express Unspecified Vulnerability (0.14.21)
IBM RTC Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-1725)
WordPress Plugin Participants Database SQL Injection (1.9.5.5)