- 漏洞ID:
- 漏洞类型:跨站脚本
- 发布日期:2026-01-24 00:00:00
- 更新时间:2026-01-26 00:00:00
- CVE编号:CVE-2026-1266
- CNNVD-ID:CNNVD-202601-4271
- 漏洞平台:WTW
- CVSS评分:
暂无
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Postalicious 3.0.1及之前版本存在跨站脚本漏洞,该漏洞源于输入清理和输出转义不足,可能导致存储型跨站脚本攻击。
来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/postalicious/tags/3.0.1/wp-postalicious.php#L316 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/postalicious/tags/3.0.1/wp-postalicious.php#L533 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/postalicious/tags/3.0.1/wp-postalicious.php#L541 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/postalicious/tags/3.0.1/wp-postalicious.php#L548 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/postalicious/trunk/wp-postalicious.php#L316 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/postalicious/trunk/wp-postalicious.php#L533 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/postalicious/trunk/wp-postalicious.php#L541 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/postalicious/trunk/wp-postalicious.php#L548 来源:www.wordfence.com 链接:https://www.wordfence.com/threat-intel/vulnerabilities/id/512c9a2f-b023-4e28-8dd8-35795e68a8b3?source=cve 来源:access.redhat.com 链接:https://access.redhat.com/security/cve/cve-2026-1266
返回




微信扫码关注公众号







