WordPress Integrator 'redirect_to' Parameter Cross Site Scripting Vulnerability

Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.

The following example URI is available:

http://www.example.com/wordpress/wp-login.php?redirect_to=http://%3F1<ScrIpT>alert(666)</ScrIpT>


 

Privacy Statement
Copyright 2010, SecurityFocus