Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the DMSGuestbook 1.7.0 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) file parameter to wp-admin/admin.php, or the (2) messagefield parameter in the guestbook page, and the (3) title parameter in the messagearea.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dmsguestbook Project | Dmsguestbook | 1.7.0 |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/3615Broken Link
- http://www.securityfocus.com/archive/1/487437/100/0/threadedThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/27575ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/5035Third Party AdvisoryVDB Entry
- http://securityreason.com/securityalert/3615Broken Link
- http://www.securityfocus.com/archive/1/487437/100/0/threadedThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/27575ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/5035Third Party AdvisoryVDB Entry
FAQ
What is CVE-2008-0617?
CVE-2008-0617 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in the DMSGuestbook 1.7.0 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) file parameter to wp-admin/...
How severe is CVE-2008-0617?
CVE-2008-0617 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0617?
Check the references section above for vendor advisories and patch information. Affected products include: Dmsguestbook Project Dmsguestbook.