WordPress Plugin Vulnerabilities
Digital Publications by Supsystic < 1.7.4 - Admin+ Stored Cross-Site Scripting
Description
The plugin does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Proof of Concept
1. Create new publication, name it whatever 2. Click the "Custom Page" tab to add a new page: - name it with the desired payload as the title: `aaa" onclick='alert(123);' ">` - select the publication you just created by checking the box next to it. - click publish 3. Go back to the list of publications, open the one you created and go to the "All Pages" tab: - click on the title of the page created in 2, and the payload triggers
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
iohex
Submitter
iohex
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-07-21 (about 1 years ago)
Added
2022-07-21 (about 1 years ago)
Last Updated
2023-04-20 (about 1 years ago)