WordPress Plugin Vulnerabilities

Google Places Review < 2.0.0 - Admin+ Stored Cross Site Scripting

Description

The plugin does not properly escape its Google API key setting, which is reflected on the site's administration panel. A malicious administrator could abuse this bug, in a multisite WordPress configuration, to trick super-administrators into viewing the booby-trapped payload and taking over their account.

Proof of Concept

Put the following payload in the "Google Places API Key" settings of the plugin: test" onfocus=javascript:alert('xss') height="

Affects Plugins

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Krishna Harsha Kondaveeti
Submitter
krishna harsha
Verified
Yes

Timeline

Publicly Published
2022-05-17 (about 2 years ago)
Added
2022-05-17 (about 2 years ago)
Last Updated
2022-05-18 (about 2 years ago)

Other