WordPress Plugin Vulnerabilities

Evaluate <= 1.0 - Admin+ Stored Cross-Site Scripting

Description

The plugin does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).

Proof of Concept

1. Go to Settings » Evaluate » Add New.
2. Add the payload: <script>alert(1)</script>, and the payload trigger.

Affects Plugins

No known fix

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Mariah Almotlag
Submitter
Mariah Almotlag
Verified
Yes

Timeline

Publicly Published
2022-10-29 (about 1 years ago)
Added
2022-10-29 (about 1 years ago)
Last Updated
2022-10-29 (about 1 years ago)

Other