WordPress Plugin Vulnerabilities
Google Places Review < 2.0.0 - Admin+ Stored Cross Site Scripting
Description
The plugin does not properly escape its Google API key setting, which is reflected on the site's administration panel. A malicious administrator could abuse this bug, in a multisite WordPress configuration, to trick super-administrators into viewing the booby-trapped payload and taking over their account.
Proof of Concept
Put the following payload in the "Google Places API Key" settings of the plugin: test" onfocus=javascript:alert('xss') height="
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Krishna Harsha Kondaveeti
Submitter
krishna harsha
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-05-17 (about 2 years ago)
Added
2022-05-17 (about 2 years ago)
Last Updated
2022-05-18 (about 2 years ago)