Cross-Site Scripting in WPML Plugin for WordPress
CVE-2015-2315

Currently unrated

Key Information:

Vendor
Wordpress
Status
Vendor
CVE Published:
17 March 2015

Badges

👾 Exploit Exists🟡 Public PoC

Summary

The WPML plugin for WordPress is susceptible to a Cross-Site Scripting (XSS) vulnerability, allowing remote attackers to inject arbitrary web scripts or HTML. This issue arises when user-supplied input is not properly sanitized, particularly through the 'target' parameter in a 'reminder_popup' action. If exploited, it can compromise site security and user data.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

9% chance of being exploited in the next 30 days.

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.