WordPress Plugin Vulnerabilities

Help Desk WP <= 1.2.0 - Editor+ Stored XSS

Description

The plugin does not sanitise and escape some parameters, which could allow users with a role as low as Editor to perform Cross-Site Scripting attacks.

Proof of Concept

1. Using a user with Editor Role privileges, go to the support page assigned for the Help Desk WP Plugin.
2. Click on "Add New Ticket", and fill the form with dummy data.
3. Intercept the request using an HTTP Proxy, such as BurpSuite.
4. Replace the "description" form data with the following XSS payload: <img src=q onerror=prompt('XSS')>
5. Send the request.
6. As an Administrator user, open up the ticket using the Help Desk WP Plugin through Wordpress Dashboard.
7. The XSS payload will get executed.

Affects Plugins

No known fix

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Ameen Alkurdy
Submitter
Ameen Alkurdy
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-04-19 (about 1 years ago)
Added
2023-04-19 (about 1 years ago)
Last Updated
2023-04-19 (about 1 years ago)

Other