Sammy Forgit has discovered a vulnerability in the church_admin plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks
You need to log in to the Secunia Community to view the full description of this advisory
If you are not a member of the Secunia community, you can sign up here for free.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Wordpress church_admin Plugin GET Cross-Site Scripting Vulnerability
Score: 0 Posts: 2 User Since: 8th Jul 2012 System Score: N/A Location: UK Last edited on 8th Jul, 2012 08:45
That file just contained print_r($_GET); and was used in initial testing - no danger to anyone! No cross scripting vulnerability either - it didn't do anything.
It was not called from anywhere in the plugin and has now been removed from svn wordpress.org repository