|Title: Reflected XSS in wordpress plugin e-search v1.0|
|Author: Larry W. Cashdollar, @_larry0|
|Download Site: https://wordpress.org/plugins/e-search|
|Vendor Notified: 2016-02-09|
|Vendor Contact: email@example.com|
|Plugin Name: e-search|
There is a reflected XSS vulnerability in the following php code ./e-search/tmpl/title_az.php: 44: <input name="title_az" type="hidden" value="<?php echo $_GET["title_az"]; ?>" /> The variable title_az appears to send unsanitized data back to the users browser.
Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.