Vulnerability Description
Cross-site scripting (XSS) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trioniclabs | Sentinel | 1.0.0 |
| Wordpress | Wordpress | - |
Related Weaknesses (CWE)
References
- http://osvdb.org/77777
- http://plugins.trac.wordpress.org/changeset?reponame=&new=475315%40wordpress-sen
- http://secunia.com/advisories/47020Vendor Advisory
- http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/
- http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html
- http://www.securityfocus.com/bid/51089
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71854
- http://osvdb.org/77777
- http://plugins.trac.wordpress.org/changeset?reponame=&new=475315%40wordpress-sen
- http://secunia.com/advisories/47020Vendor Advisory
- http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/
- http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html
- http://www.securityfocus.com/bid/51089
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71854
FAQ
What is CVE-2011-5225?
CVE-2011-5225 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site scripting (XSS) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
How severe is CVE-2011-5225?
CVE-2011-5225 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-5225?
Check the references section above for vendor advisories and patch information. Affected products include: Trioniclabs Sentinel, Wordpress Wordpress.