WordPress Plugin Vulnerabilities

Bookly < 20.3.1 - Staff Member Stored Cross-Site Scripting

Description

The plugin does not escape the Staff Full Name field before outputting it back in a page, which could lead to a Stored Cross-Site Scripting issue

Proof of Concept

As a Staff Member, put the following payload in your Full Name (Booklyn --> Profile --> Edit --> Full Name): <script>alert(/XSS/)</script>

The XSS will be triggered when an admin open the Staff members order page (Booklyn --> Staff Members --> Staff member order)

Affects Plugins

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Mesut Cetin
Submitter
Mesut Cetin
Verified
Yes

Timeline

Publicly Published
2021-11-08 (about 2 years ago)
Added
2021-11-08 (about 2 years ago)
Last Updated
2022-04-12 (about 2 years ago)

Other