Description
WordPress Plugin Tooltipy (tooltips for WP) is prone to multiple vulnerabilities, including cross-site scripting and cross-site request forgery vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, or to perform certain administrative actions and gain unauthorized access to the affected application. WordPress Plugin Tooltipy (tooltips for WP) version 5.0.2 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 5.1 or latest
References
https://advisories.dxw.com/advisories/xss-in-tooltipy/
https://advisories.dxw.com/advisories/csrf-in-tooltipy/
https://packetstormsecurity.com/files/148168/WordPress-Tooltipy-5.0-Cross-Site-Scripting.html
https://packetstormsecurity.com/files/148169/WordPress-Tooltipy-5.0-Cross-Site-Request-Forgery.html
https://plugins.svn.wordpress.org/bluet-keywords-tooltip-generator/trunk/readme.txt
Related Vulnerabilities
RubyGems Cryptographic Issues Vulnerability (CVE-2013-4287)
WordPress Plugin Kento Post View Counter Multiple Vulnerabilities (2.8)
Joomla! Core 2.5.x Cross-Site Scripting (2.5.0 - 2.5.6)
WordPress Plugin WP Affiliate Disclosure Security Bypass (1.1.3)
Jboss EAP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2010-3878)