WordPress Plugin Vulnerabilities

WordPress File Upload < 4.23.3 - Author+ Stored Cross-Site Scripting

Description

The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as authors to perform Stored Cross-Site Scripting attacks.

Proof of Concept

1. Add the following shortcode to a post:

[wordpress_file_upload redirect="true" redirectlink="javascript:alert(1)"]

2. Upload any file on the resulting post.
3. After the upload completes, you will see the XSS alert in the browser.

Affects Plugins

Fixed in 4.23.3

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
FAIYAZ AHMAD
Submitter
FAIYAZ AHMAD
Verified
Yes

Timeline

Publicly Published
2023-09-25 (about 7 months ago)
Added
2023-09-25 (about 7 months ago)
Last Updated
2023-09-27 (about 7 months ago)

Other