WordPress Plugin Vulnerabilities
Add-on SweetAlert Contact Form 7 < 1.0.8 - Authenticated Stored Cross-Site Scripting (XSS)
Description
Stored XSS "post-auth" in "tittle" field of the "Error Alert" and "Success Alert" sections of the plugin's settings page due to poor sanitization of entered characters.
When you enter the payload and save the changes, it is permanently embedded in the html code of the settings page, so all users who visit the plugin's settings can suffer the attack.
Edit (WPScanTeam):
May 13th, 2020 - Confirmed & Escalated to WP Plugin Team
May 21st, 2020 - v1.0.8 released, fixing the issu
Proof of Concept
Affects Plugins
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Juan M.
Submitter
Mike_JMSec
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2020-05-25 (about 5 years ago)
Added
2020-05-25 (about 5 years ago)
Last Updated
2020-05-25 (about 5 years ago)