First published: Wed Aug 05 2015(Updated: )
Cross-site scripting (XSS) vulnerability in the Ephox (formerly Moxiecode) plupload.flash.swf shim 2.1.2 in Plupload, as used in WordPress 3.9.x, 4.0.x, and 4.1.x before 4.1.2 and other products, allows remote attackers to execute same-origin JavaScript functions via the target parameter, as demonstrated by executing a certain click function, related to _init.as and _fireEvent.as.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
WordPress | =3.9.0 | |
WordPress | =3.9.1 | |
WordPress | =3.9.2 | |
WordPress | =3.9.3 | |
WordPress | =4.0 | |
WordPress | =4.0.1 | |
WordPress | =4.1 | |
WordPress | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3439 is classified as a moderate severity cross-site scripting vulnerability.
To fix CVE-2015-3439, update WordPress to version 4.1.2 or later.
CVE-2015-3439 affects WordPress versions 3.9.x, 4.0.x, and 4.1.x prior to 4.1.2, as well as Debian Linux versions 7.0 and 8.0.
CVE-2015-3439 allows remote attackers to execute arbitrary same-origin JavaScript functions due to an XSS vulnerability.
Yes, known exploits for CVE-2015-3439 can allow attackers to manipulate user interactions through crafted payloads.