6scan detects file that could be exploited
-
This XSS vulnerability is exploitable, because input is not checked for html characters
Login to your WordPress FTP
Go to your SEO Friendly Images XSS directory
Backup the seo-friendly-images.php file
Open it for editing
Find the “$_SERVER[‘REQUEST_URI’] string”
Replace it with
htmlspecialchars( $_SERVER[‘REQUEST_URI’] , ENT_QUOTES )
Save
Check SEO Friendly Images functionality, to make sure it works as intended
DoneShould I do this?
Viewing 1 replies (of 1 total)
Viewing 1 replies (of 1 total)
- The topic ‘6scan detects file that could be exploited’ is closed to new replies.