Vulnerability Description
Cross-site scripting (XSS) vulnerability in admin/walkthrough/walkthrough.php in the Design Approval System plugin before 3.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the step parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Slickremix | Design Approval System Plugin | <= 3.6 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2013-09/0055.htmlExploit
- http://wordpress.org/plugins/design-approval-system/other_notes/Patch
- http://archives.neohapsis.com/archives/bugtraq/2013-09/0055.htmlExploit
- http://wordpress.org/plugins/design-approval-system/other_notes/Patch
FAQ
What is CVE-2013-5711?
CVE-2013-5711 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site scripting (XSS) vulnerability in admin/walkthrough/walkthrough.php in the Design Approval System plugin before 3.7 for WordPress allows remote attackers to inject arbitrary web script or HT...
How severe is CVE-2013-5711?
CVE-2013-5711 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-5711?
Check the references section above for vendor advisories and patch information. Affected products include: Slickremix Design Approval System Plugin.