|Title: Reflected XSS in wordpress plugin whizz v1.0.7|
|Author: Larry W. Cashdollar, @_larry0|
|Download Site: https://wordpress.org/plugins/whizz|
|Vendor Notified: 2016-02-09|
|Vendor Contact: email@example.com, fixed in v1.0.8|
|Plugin Name: whizz|
There is a reflected XSS vulnerability in the following php code ./whizz/plugins/delete-plugin.php: 7:<strong><?php echo $_GET['plugin']; ?></strong> The variable plugin appears to send unsanitized data back to the users browser.
Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.