The plugin does not sanitise and escape its API Key settings before outputting it in an attribute, leading to a Stored Cross-Site Scripting issue even when the unfiltered_html capability is disallowed
Put the following payload in the API Key settings of the plugin: '></script><script>alert(/XSS/)</script> The XSS will be triggered when viewing the settings again, as well as all frontend pages
Hassan Khan Yusufzai - Splint3r7
Yes
2022-03-30 (about 1 years ago)
2022-03-30 (about 1 years ago)
2022-05-04 (about 1 years ago)