WordPress Plugin Vulnerabilities

Easy Testimonials < 3.6 - Authenticated Stored Cross-Site Scripting (XSS)

Description

Multiple cross-site scripting vulnerabilities in Easy Testimonials 3.5.2 and lower allow remote attackers to inject arbitrary web script or HTML via the Client Name, Position / Web Address / Other, Location Reviewed / Product Reviewed / Item Reviewed, Rating parameter.

Successful exploitation of this vulnerability would allow an authenticated medium-privileged user (contributor+) to inject arbitrary javascript code which is executed when admin and other users access the All Testimonials page in the backend. Furthermore, if the 'Allow HTML Tags in Testimonials' option is enabled (which is the default), the XSS will also be triggered when the testimonial is displayed in the frontend.

Timeline (WPScanTeam)
May 9th, 2020 - Confirmed & Escalated to WP Plugins Team
May 11th, 2020 - WP Plugins Team Investigating
May 12th, 2020 - v3.6 released, fixing the issue

Proof of Concept

Affects Plugins

Fixed in 3.6

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Ngo Van Thien - SunCSR
Submitter
Ngo Van Thien
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2020-05-13 (about 6 years ago)
Added
2020-05-13 (about 6 years ago)
Last Updated
2020-06-23 (about 5 years ago)

Other