The Injection Guard WordPress plugin before 1.2.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/14a53525-8c08-472d-bae4-b3f14368b802/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/14a53525-8c08-472d-bae4-b3f14368b802/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-08-14 06:15
Updated : 2026-01-16 20:00
NVD link : CVE-2025-8046
Mitre link : CVE-2025-8046
CVE.ORG link : CVE-2025-8046
JSON object : View
Products Affected
fahadmahmood
- injection_guard
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
