Description
WordPress Plugin GigPress is prone to an HTML injection vulnerability because it fails to properly sanitize user-supplied input. Attacker-supplied HTML and script code could be executed in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. WordPress Plugin GigPress versions prior to 2.1.10 are vulnerable; other versions may also be affected.
Remediation
Update to plugin version 2.1.11 or latest
References
Related Vulnerabilities
WordPress Plugin Unlimited PopUps SQL Injection (4.5.3)
Joomla! Core 1.0.x Session Fixation (1.0.0 - 1.0.12)
WordPress Plugin WP-Cumulus 'tagcloud.swf' Cross-Site Scripting (1.22)
IBM RTC Improper Input Validation Vulnerability (CVE-2015-1928)
RubyGems Improper Input Validation Vulnerability (CVE-2018-1000077)