Vulnerability Description
Cross-site scripting (XSS) vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.3.2 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the aoid parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wptrafficanalyzer | Trafficanalyzer | 1.0.0 |
| Wordpress | Wordpress | - |
Related Weaknesses (CWE)
References
- http://osvdb.org/92197
- http://packetstormsecurity.com/files/121167/WordPress-Traffic-Analyzer-Cross-SitExploit
- http://secunia.com/advisories/52929Vendor Advisory
- http://www.securityfocus.com/bid/58948Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83311
- http://osvdb.org/92197
- http://packetstormsecurity.com/files/121167/WordPress-Traffic-Analyzer-Cross-SitExploit
- http://secunia.com/advisories/52929Vendor Advisory
- http://www.securityfocus.com/bid/58948Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83311
FAQ
What is CVE-2013-3526?
CVE-2013-3526 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site scripting (XSS) vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.3.2 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML...
How severe is CVE-2013-3526?
CVE-2013-3526 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3526?
Check the references section above for vendor advisories and patch information. Affected products include: Wptrafficanalyzer Trafficanalyzer, Wordpress Wordpress.