The plugin does not sanitise and escape various of its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Payload used: <script>alert(/XSS/)</script> - Put the payload in the TMEM Events > Settings > Events > Event prefix field, then Create an event to trigger the XSS - Put the payload in the TMEM Events > Settings > Client Zone > Application Name field. The XSS will be triggered thought the plugin - Put the payload in the TMEM Events > Settings > General > Company Name field. The XSS will be triggered in the admin dashboard
Varun thorat
Varun thorat
Yes
2021-12-24 (about 1 years ago)
2021-12-24 (about 1 years ago)
2022-04-10 (about 9 months ago)