CVE-2011-4926 Scanner
CVE-2011-4926 scanner - Cross-Site Scripting (XSS) vulnerability in Adminimize
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 1 day
Scan only one
URL
Toolbox
-
Adminimize is a plugin for WordPress that allows users to customize the WordPress admin interface by hiding unnecessary settings and menu items. With this plugin, users can enhance the admin interface by customizing it based on their needs. It also helps reduce the visual clutter, making it easier for users to navigate through the admin interface. Adminimize is widely used by WordPress users, and it is available for free.
CVE-2011-4926 is an XSS vulnerability in adminimize/adminimize_page.php detected in the Adminimize plugin before version 1.7.22. This vulnerability allows remote attackers to inject arbitrary web script or HTML via the page parameter. As a result, any user who clicks on the malicious link can have their sensitive information stolen, or their entire website can be taken over. This vulnerability can also lead to unauthorized access, data loss, and system compromise.
The CVE-2011-4926 vulnerability, if exploited, can result in severe consequences. With the ability to inject arbitrary web script or HTML, attackers can steal sensitive information such as login credentials, credit card information, and other personal data. Attackers can also manipulate the website's content, display malicious content, redirect users to malicious websites, or even take over the entire website. This vulnerability poses a serious threat to WordPress users, and it is crucial that they take action to protect their website and its visitors.
In conclusion, it is essential to take action to protect your website from vulnerabilities such as CVE-2011-4926. With the pro features of S4E, users can easily and quickly learn about vulnerabilities in their digital assets, including their website. By staying informed and taking proactive measures to protect their website, users can reduce the risk of data loss, system compromise, and other severe consequences.
REFERENCES
- http://plugins.trac.wordpress.org/changeset?reponame=&new=467338@adminimize&old=466900@adminimize#file5
- http://wordpress.org/extend/plugins/adminimize/changelog/
- http://www.openwall.com/lists/oss-security/2012/01/05/10
- http://www.openwall.com/lists/oss-security/2012/01/10/9
- http://www.securityfocus.com/archive/1/520591
- http://www.securityfocus.com/archive/1/520591/100/0/threaded
- http://www.securityfocus.com/bid/50745
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71414