WordPress HTTP parameter pollution

This really wouldn’t have anything to do with WordPress intrinsically. It would be related to some plugin or code that passes values based on post data or anything that can request back-end HTTP to another application. The problem is you are open for XSS and SQL injection.

Do you have user input fields i.e. POST data that is passed without encoding the URL properly? Any point of user input should be sanitized.

Check out http://www.w3schools.com/tags/ref_urlencode.asp for reference.

I found an example of this here – https://stackoverflow.com/questions/19809142/http-parameter-pollution

Leave a Comment

Hata!: SQLSTATE[HY000] [1045] Access denied for user 'divattrend_liink'@'localhost' (using password: YES)