Reflected XSS vulnerability – risk level
-
According to the information by Wordfence, Foogallery is vulnerable to Reflected Cross-Site Scripting (Reflected XSS). I tried to determine the risk level, since Foogallery is installed on 4 of my websites. According to various web sources, Reflected XSS needs user interaction to do any damage, e.g. tricking a user into clicking on a “crafted link”.
I don’t see any user interaction possibilites provided by Foogallery on the frontend for not logged-in users. So this vulnerability appears to be only relevant for authenticated (logged-in) users, which, in the case of my websites, means only myself = low risk.
But I could be wrong. We’ll have to wait on information provided by the authors of Foogallery.
The topic ‘Reflected XSS vulnerability – risk level’ is closed to new replies.