|Title: Reflected XSS in wordpress plugin pondol-carousel v1.0|
|Author: Larry W. Cashdollar, @_larry0|
|Download Site: https://wordpress.org/plugins/pondol-carousel|
|Vendor Notified: 2016-02-09|
|Vendor Contact: firstname.lastname@example.org|
|Plugin Name: pondol-carousel|
There is a reflected XSS vulnerability in the following php code ./pondol-carousel/pages/admin_create.php: 5: var itemid = "<?php echo $_GET["itemid"];?>"; The variable itemid appears to send unsanitized data back to the users browser.
Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.