WordPress Plugin Vulnerabilities

QR Redirector < 1.6.1 - Contributor+ Stored Cross-Site Scripting

Description

The plugin does not sanitise and escape some of the QR Redirect fields, which could allow users with a role as low as Contributor perform Stored Cross-Site Scripting attacks.

Proof of Concept

As a contributor, create/edit a "QR Redirect" and set the following fields:

"URL to Redirect to": https://example.com/#" style="animation-name:rotation" onanimationend="alert(/XSS-URL/)//
"Admin Notes": </textarea><script>alert(/XSS-admin-notes/)</script>

The XSS will be triggered when any user access the QR Redirect (for example an admin reviewing it)

Affects Plugins

Fixed in 1.6.1

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
apple502j
Submitter
apple502j
Verified
Yes

Timeline

Publicly Published
2021-10-18 (about 2 years ago)
Added
2021-10-18 (about 2 years ago)
Last Updated
2022-04-15 (about 2 years ago)

Other