{"id":"CVE-2015-3429","details":"Cross-site scripting (XSS) vulnerability in example.html in Genericons before 3.3.1, as used in WordPress before 4.2.2, allows remote attackers to inject arbitrary web script or HTML via a fragment identifier.","modified":"2026-04-10T03:46:20.481511Z","published":"2015-06-17T18:59:03Z","references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3328"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2015/May/41"},{"type":"EVIDENCE","url":"https://www.digitalocean.com/community/tutorials/how-to-protect-your-wordpress-site-from-the-genericons-example-html-xss-vulnerability"},{"type":"EVIDENCE","url":"https://www.netsparker.com/cve-2015-3429-dom-xss-vulnerability-in-twenty-fifteen-wordpress-theme/"},{"type":"FIX","url":"https://github.com/Automattic/Genericons/commit/798ac98579dd72dfdb11bdee3e7bebf01cffb1f7"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html"},{"type":"WEB","url":"http://packetstormsecurity.com/files/131802/WordPress-Twenty-Fifteen-4.2.1-Cross-Site-Scripting.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/535486/100/1000/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/74534"},{"type":"WEB","url":"https://wordpress.org/news/2015/05/wordpress-4-2-2/"},{"type":"WEB","url":"https://wpvulndb.com/vulnerabilities/7965"}],"schema_version":"1.7.5"}