The plugin does not sanitise and escape its Campaign URL settings before outputting it in an attribute, leading to a Stored Cross-Site Scripting issue even when the unfiltered_html capability is disallowed
Put the following payload in the Campaign URL settings of the plugin: "><img src onerror=alert(/XSS/)>
Hassan Khan Yusufzai - Splint3r7
Yes
2022-03-30 (about 1 years ago)
2022-03-30 (about 1 years ago)
2022-04-20 (about 1 years ago)