WordPress Plugin Vulnerabilities

ShopLentor < 2.5.4 - Contributor+ Stored XSS

Description

The plugin does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.

Proof of Concept

As a contributor, add a "WL : FAQ" Gutenberg block to a post, and put the following payload in the "Additional CSS class(es)" advance settings of the block:

" onmouseover="alert(/XSS/)" style="background:red;"

The payload will be triggered when viewing/previewing the post and moving the mouse over the red block.

Note: A Template Builder needs to be present (one can be created by an admin at /wp-admin/edit.php?post_type=woolentor-template)

Affects Plugins

Fixed in 2.5.4

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Lana Codes
Submitter
Lana Codes
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-01-28 (about 1 years ago)
Added
2023-01-28 (about 1 years ago)
Last Updated
2023-01-28 (about 1 years ago)

Other