WordPress Plugin Vulnerabilities
Browser and Operating System Finder <= 1.2 - Unauthenticated Arbitrary Settings Update to Stored XSS
Description
The plugin does not have authorisation and CSRF checks when saving its settings, allowing unauthenticated users to update them, which could also lead to Stored XSS due to the lack of sanitisation and escaping.
The original advisory mention a CSRF issue, which is incorrect, as unauthenticated users can exploit this themselves w/o a CSRF attack. Furthermore, v1.2 added a CSRF check, but is still missing capability check
Proof of Concept
Affects Plugins
References
Classification
Type
NO AUTHORISATION
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Imai Shinpei of Cryptography Laboratory
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-11-25 (about 4 years ago)
Added
2022-06-02 (about 3 years ago)
Last Updated
2023-03-04 (about 3 years ago)