First published: Fri Dec 31 2004(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1559 has a medium severity rating due to its potential for allowing remote attackers to perform cross-site scripting (XSS) attacks.
To fix CVE-2004-1559, upgrade to a newer version of WordPress beyond 1.2 that has addressed these XSS vulnerabilities.
CVE-2004-1559 allows attackers to perform cross-site scripting attacks that can lead to session hijacking, redirecting users, or executing arbitrary JavaScript.
CVE-2004-1559 specifically affects WordPress version 1.2.
Yes, CVE-2004-1559 can be exploited without user interaction, allowing attackers to inject scripts into web pages viewed by users.