Security for everyone

CVE-2013-2287 Scanner

Detects 'Cross-Site Scripting (XSS)' vulnerability in Uploader plugin for WordPress affects v. 1.0.4.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2013-2287 Scanner Detail

The Uploader plugin for WordPress is a tool designed to help website administrators easily upload various types of files to their WordPress website. Its primary purpose is to provide a user-friendly interface and simplify the process of uploading files to the website. This plugin is popular among website administrators who need to frequently upload files and images to their WordPress site.

One of the vulnerabilities that has been discovered in the Uploader plugin is CVE-2013-2287. This type of vulnerability is known as a cross-site scripting (XSS) vulnerability. This vulnerability occurs due to insufficient input validation, allowing an attacker to inject their own malicious code into the targeted web application. In this case, the vulnerable code is found in the views/notify.php file, where an attacker can inject arbitrary web script or HTML using the "notify" or "blog" parameter.

If this vulnerability is exploited, it could lead to significant consequences for the targeted website. An attacker could potentially gain unauthorized access to sensitive information, inject malicious code into the website, and even steal user credentials. This could result in a loss of user trust and potentially even legal action against the website.

Thanks to the pro features of the platform, readers of this article can quickly and easily learn about vulnerabilities in their digital assets. The platform provides a comprehensive vulnerability scanner that detects and reports on potential security weaknesses in websites and web applications. With, website administrators can be confident that their digital assets will remain secure and protected from potential cyber attacks.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture