WordPress Plugin Vulnerabilities
Ninja Forms < 3.6.34 - Admin+ Stored XSS
Description
The plugin does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue
Proof of Concept
1. Install and activate the Ninja Forms WordPress 2. As an admin with the unfiltered_html capability, create a new form. 3. In the form settings, add a new text field. 4. In the field label, enter the following code: <img src=x onerror=alert(1)>, or Name<a href=javascript:alert(/XSS-1/) onfocus=alert(/XSS-2/) autofocus>ClickME, maybe</a> 5. Save the form. The XSS will be triggered when viewing the form in the frontend, as well as when editing the form in the backend
Affects Plugins
References
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Jonathan Zamora
Submitter
Jonathan Zamora
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-10-16 (about 1 months ago)
Added
2023-10-16 (about 1 months ago)
Last Updated
2023-10-17 (about 1 months ago)