First published: Sun Sep 23 2012(Updated: )
Cross-site scripting (XSS) vulnerability in vendors/samswhois/samswhois.inc.php in the Whois Search plugin 1.4.2.3 for WordPress, when the WHOIS widget is enabled, allows remote attackers to inject arbitrary web script or HTML via the domain parameter to index.php, a different vulnerability than CVE-2011-5194.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | ||
Phpace Samswhois | <=1.4.2.3 | |
Phpace Samswhois | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5193 is considered a moderate severity vulnerability due to its ability to allow remote code execution via cross-site scripting.
To fix CVE-2011-5193, update the Whois Search plugin to the latest version beyond 1.4.2.3 where the vulnerability has been patched.
CVE-2011-5193 affects the Whois Search plugin 1.4.2.3 for WordPress and earlier versions.
CVE-2011-5193 is classified as a cross-site scripting (XSS) vulnerability.
Yes, CVE-2011-5193 can be exploited remotely by injecting malicious scripts through the WHOIS widget.