Description
WordPress Plugin Delete Comments By Status is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. WordPress Plugin Delete Comments By Status version 1.5.2 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.5.3 or latest
References
Related Vulnerabilities
WebLogic CVE-2016-0572 Vulnerability (CVE-2016-0572)
WordPress Plugin Ajax Contact Form Cross-Site Scripting (1.0)
WordPress Plugin Clicky by Yoast Multiple Cross-Site Scripting Vulnerabilities (1.5)
WordPress Plugin Ultimate Appointment Booking & Scheduling Cross-Site Scripting (1.1.9)
Dotclear Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-5083)