Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the (1) callback_multicheck, (2) callback_radio, and (3) callback_wysiwygin functions in mfrh_class.settings-api.php in the Media File Renamer plugin 1.7.0 for WordPress allow remote authenticated users with permissions to add media or edit media to inject arbitrary web script or HTML via unspecified parameters, as demonstrated by the title of an uploaded file.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jordy Meow | Media File Renamer | 1.7.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/archive/1/531270/100/0/threaded
- http://www.securityfocus.com/bid/65715
- http://www.vapid.dhs.org/advisories/wordpress/plugins/MediaFileRenamer-1.7.0/indExploit
- http://www.securityfocus.com/archive/1/531270/100/0/threaded
- http://www.securityfocus.com/bid/65715
- http://www.vapid.dhs.org/advisories/wordpress/plugins/MediaFileRenamer-1.7.0/indExploit
FAQ
What is CVE-2014-2040?
CVE-2014-2040 is a vulnerability with a CVSS score of 2.1 (LOW). Multiple cross-site scripting (XSS) vulnerabilities in the (1) callback_multicheck, (2) callback_radio, and (3) callback_wysiwygin functions in mfrh_class.settings-api.php in the Media File Renamer pl...
How severe is CVE-2014-2040?
CVE-2014-2040 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2040?
Check the references section above for vendor advisories and patch information. Affected products include: Jordy Meow Media File Renamer.