Cross-site Scripting Vulnerability in Church Admin Plugin for WordPress
CVE-2015-4127

Currently unrated

Key Information:

Vendor

Wordpress

Vendor
CVE Published:
28 May 2015

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2015-4127?

The Church Admin plugin for WordPress prior to version 0.810 is vulnerable to a cross-site scripting (XSS) flaw. This allows remote attackers to inject arbitrary web scripts or HTML into the application via the 'address' parameter. An exploit can occur via requests to specific URLs, such as index.php/2015/05/21/church_admin-registration-form/, potentially compromising user data and site integrity. Website administrators are urged to update to the latest version to mitigate the risk of exploitation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.