4.3
CVE-2009-4168
- EPSS 5.2%
- Veröffentlicht 02.12.2009 18:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
WP-Cumulus <= 1.22 - Cross-Site Scripting via tagcloud
Cross-site scripting (XSS) vulnerability in Roy Tanck tagcloud.swf, as used in the WP-Cumulus plugin before 1.23 for WordPress and the Joomulus module 2.0 and earlier for Joomla!, allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter in a tags action. Cross-site scripting (XSS) vulnerability in tagcloud.swf in the WP-Cumulus Plug-in before 1.23 for WordPress allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter.
Mögliche Gegenmaßnahme
WP Cumulus: Update to version 1.23, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WP Cumulus
Version
*-1.22
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Roytanck ≫ Wp-cumulus Version <= 1.22
Roytanck ≫ Wp-cumulus Version1.00
Roytanck ≫ Wp-cumulus Version1.01
Roytanck ≫ Wp-cumulus Version1.02
Roytanck ≫ Wp-cumulus Version1.2.1
Roytanck ≫ Wp-cumulus Version1.03
Roytanck ≫ Wp-cumulus Version1.04
Roytanck ≫ Wp-cumulus Version1.05
Roytanck ≫ Wp-cumulus Version1.10
Roytanck ≫ Wp-cumulus Version1.11
Roytanck ≫ Wp-cumulus Version1.12
Roytanck ≫ Wp-cumulus Version1.13
Roytanck ≫ Wp-cumulus Version1.14
Roytanck ≫ Wp-cumulus Version1.15
Roytanck ≫ Wp-cumulus Version1.16
Roytanck ≫ Wp-cumulus Version1.17
Roytanck ≫ Wp-cumulus Version1.18
Roytanck ≫ Wp-cumulus Version1.19
Roytanck ≫ Wp-cumulus Version1.20
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 5.2% | 0.896 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.