WordPress Plugin Vulnerabilities
Help Desk WP <= 1.2.0 - Editor+ Stored XSS
Description
The plugin does not sanitise and escape some parameters, which could allow users with a role as low as Editor to perform Cross-Site Scripting attacks.
Proof of Concept
1. Using a user with Editor Role privileges, go to the support page assigned for the Help Desk WP Plugin. 2. Click on "Add New Ticket", and fill the form with dummy data. 3. Intercept the request using an HTTP Proxy, such as BurpSuite. 4. Replace the "description" form data with the following XSS payload: <img src=q onerror=prompt('XSS')> 5. Send the request. 6. As an Administrator user, open up the ticket using the Help Desk WP Plugin through Wordpress Dashboard. 7. The XSS payload will get executed.
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Ameen Alkurdy
Submitter
Ameen Alkurdy
Submitter website
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-04-19 (about 1 years ago)
Added
2023-04-19 (about 1 years ago)
Last Updated
2023-04-19 (about 1 years ago)