CVE-2013-4241
moderate-risk
Published 2020-01-30
Multiple cross-site scripting (XSS) vulnerabilities in the HMS Testimonials plugin before 2.0.11 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) image, (3) url, or (4) testimonial parameter to the Testimonial form (hms-testimonials-addnew page); (5) date_format parameter to the Settings - Default form (hms-testimonials-settings page); (6) name parameter in a Save action to the Settings - Custom Fields form (hms-testimonials-settings-fields page); or (7) name parameter in a Save action to the Settings - Template form (hms-testimonials-templates-new page).
Do I need to act?
~
2.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Mailing List
http://seclists.org/oss-sec/2013/q3/345
Mailing List
http://seclists.org/oss-sec/2013/q3/361
Mailing List
http://seclists.org/oss-sec/2013/q3/345
Mailing List
http://seclists.org/oss-sec/2013/q3/361
40
/ 100
moderate-risk
Severity
23/34 · High
Exploitability
12/34 · Low
Exposure
5/34 · Minimal