Cross-Site Scripting in WPML Plugin for WordPress
CVE-2015-2315
Currently unrated
Key Information:
Badges
👾 Exploit Exists🟡 Public PoC
Summary
The WPML plugin for WordPress is susceptible to a Cross-Site Scripting (XSS) vulnerability, allowing remote attackers to inject arbitrary web scripts or HTML. This issue arises when user-supplied input is not properly sanitized, particularly through the 'target' parameter in a 'reminder_popup' action. If exploited, it can compromise site security and user data.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
9% chance of being exploited in the next 30 days.
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved