The plugin does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Open the plugin and intercept the request using burpsuite. Give the below payload in the parameter "flickr_id" and submit the request. xss"/><script>prompt(2)</script>//xss The stored XSS will be triggered whenever the user visits the page.
Kishore Hariram
Kishore Hariram
Yes
2022-08-29 (about 1 years ago)
2022-08-29 (about 1 years ago)
2022-08-29 (about 1 years ago)