First published: Tue Oct 09 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in pay.php in the Pay With Tweet plugin before 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) link, (2) title, or (3) dl parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wordpress Pay-with-tweet | <=1.1 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-5349 is considered medium due to multiple cross-site scripting vulnerabilities allowing remote attackers to execute arbitrary scripts.
To fix CVE-2012-5349, upgrade the Pay With Tweet plugin to version 1.2 or later.
CVE-2012-5349 affects the Pay With Tweet plugin versions prior to 1.2.
Yes, CVE-2012-5349 can be exploited easily by sending specially crafted input to the vulnerable parameters in the pay.php file.
Ensure your Pay With Tweet plugin is updated to the latest version and monitor for any unusual activity on your WordPress site.