Vulnerability Description
The "SagePay Server Gateway for WooCommerce" plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Patsatech | Sagepay Server Gateway For Woocommerce | < 1.0.9 |
Related Weaknesses (CWE)
References
- https://packetstormsecurity.com/files/145459/WordPress-Sagepay-Server-Gateway-FoThird Party AdvisoryVDB Entry
- https://wordpress.org/plugins/sagepay-server-gateway-for-woocommerce/#developersThird Party Advisory
- https://wordpress.org/support/topic/sagepay-server-gateway-for-woocommerce-1-0-7Third Party Advisory
- https://packetstormsecurity.com/files/145459/WordPress-Sagepay-Server-Gateway-FoThird Party AdvisoryVDB Entry
- https://wordpress.org/plugins/sagepay-server-gateway-for-woocommerce/#developersThird Party Advisory
- https://wordpress.org/support/topic/sagepay-server-gateway-for-woocommerce-1-0-7Third Party Advisory
FAQ
What is CVE-2018-5316?
CVE-2018-5316 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The "SagePay Server Gateway for WooCommerce" plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter.
How severe is CVE-2018-5316?
CVE-2018-5316 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-5316?
Check the references section above for vendor advisories and patch information. Affected products include: Patsatech Sagepay Server Gateway For Woocommerce.