The plugin did not sanitise the Project Name before outputting it back in the page, leading to a Stored Cross-Site Scripting issue. By default, only administrator users could access the affected functionality, limiting the exploitability of the vulnerability. However, some WordPress admins may allow lesser privileged users to access the plugin's functionality, in which case, privilege escalation could be performed.
Goto Dashboard -> New Project and enter a JavaScript payload within the Name field (projectName parameter), such as <script>alert(/XSS/)</script>
Hardik Solanki, blackangel
Yes
2021-06-07 (about 1 years ago)
2021-06-10 (about 1 years ago)
2022-01-17 (about 1 years ago)