First published: Tue Jan 21 2014(Updated: )
Cross-site scripting (XSS) vulnerability in wp-admin/plugins.php in WordPress before 3.0.2 might allow remote attackers to inject arbitrary web script or HTML via a plugin's author field, which is not properly handled during a Delete Plugin action.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.8.5.2 | |
WordPress | =2.0.11 | |
WordPress | =2.8.6 | |
WordPress | =2.0 | |
WordPress | =2.1.1 | |
WordPress | =2.2.3 | |
WordPress | =2.0.2 | |
WordPress | =2.1 | |
WordPress | =2.0.6 | |
WordPress | =2.0.1 | |
WordPress | =2.8.4 | |
WordPress | =2.0.4 | |
WordPress | =2.2 | |
WordPress | =2.1.3 | |
WordPress | =3.0 | |
WordPress | =2.8 | |
WordPress | =2.0.7 | |
WordPress | =2.1.2 | |
WordPress | =2.7.1 | |
WordPress | =2.6.3 | |
WordPress | =2.0.5 | |
WordPress | =2.8.3 | |
WordPress | =2.8.4-a | |
WordPress | =2.6.5 | |
WordPress | =2.2.2 | |
WordPress | =2.3.3 | |
WordPress | =2.0.9 | |
WordPress | =2.8.1 | |
WordPress | =2.2.1 | |
WordPress | =2.7 | |
WordPress | =2.6.2 | |
WordPress | =2.9 | |
WordPress | =2.3.1 | |
WordPress | =2.5.1 | |
WordPress | =2.6.1 | |
WordPress | =2.8.5.1 | |
WordPress | =2.9.2 | |
WordPress | =2.5 | |
WordPress | =2.0.10 | |
WordPress | =2.9.1 | |
WordPress | =2.8.2 | |
WordPress | <=3.0.1 | |
WordPress | =2.9.1.1 | |
WordPress | =2.3.2 | |
WordPress | =2.6 | |
WordPress | =2.8.5 | |
WordPress | =2.0.8 | |
WordPress | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5295 is classified as a medium severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2010-5295, upgrade to WordPress version 3.0.2 or later, where the vulnerability has been addressed.
CVE-2010-5295 affects various versions of WordPress prior to 3.0.2, specifically versions 2.0 to 2.8.6.
The potential impacts of CVE-2010-5295 include unauthorized JavaScript execution, which could lead to session hijacking or data theft.
CVE-2010-5295 occurs when user input in a plugin's author field is not properly sanitized during the deletion process.