Description
WordPress Plugin WP-UserOnline is prone to an HTML injection vulnerability because it fails to properly sanitize user-supplied input. Attacker-supplied HTML and script code could be executed in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. WordPress Plugin WP-UserOnline versions prior to 2.70 are vulnerable.
Remediation
Update to plugin version 2.70 or latest
References
http://www.securityfocus.com/bid/41335/exploit
http://websecurity.com.ua/4177/
Related Vulnerabilities
Magento Insufficient Session Expiration Vulnerability (CVE-2021-21031)
Zope Web Application Server Other Vulnerability (CVE-2000-0483)
Oracle JRE CVE-2020-2800 Vulnerability (CVE-2020-2800)
Plone CMS Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-21336)
WordPress Plugin FCChat Widget 'path' Parameter Cross-Site Scripting (2.1.7)