WordPress Plugin Vulnerabilities
Online Booking & Scheduling Calendar for WordPress by vcita < 4.4.3 - Unauthenticated Stored XSS
Description
The plugin does not validate authorization in its vcita-wordpress/v1/actions/auth REST route endpoint, allowing an unauthenticated attacker to set the connection parameters for the vcita account connection, including business_name and email address. Furthermore, the variables are stored in the database without any validation and are later inserted into the website without escaping or sanitation, leading to a stored cross-site scripting vulnerability.
Proof of Concept
Affects Plugins
References
Classification
Type
ACCESS CONTROLS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Jonas Höbenreich
Verified
No
WPVDB ID
Timeline
Publicly Published
2023-06-02 (about 2 years ago)
Added
2023-06-03 (about 2 years ago)
Last Updated
2024-12-05 (about 1 year ago)