WordPress Plugin Vulnerabilities

ImageLinks Interactive Image Builder for WordPress < 1.5.4 - Contributor+ Stored XSS

Description

The plugin does not sanitise and escape some of its settings, which could allow users such as contributor+ to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

Proof of Concept

1. Create a new vision item (with whatever role, even if it's an Administrator).

2. Connect to a user with a role as low as Contributor+ and create a new post.

3. Insert the following shortcode in a post: [imagelinks id='1' class='XSS" onmouseover="alert(1)']

4. Hover over the image inserted by going to the post, the alert triggers successfully.

Affects Plugins

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Lana Codes
Submitter
Lana Codes
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2022-12-16 (about 1 years ago)
Added
2022-12-16 (about 1 years ago)
Last Updated
2022-12-21 (about 1 years ago)

Other