WordPress Plugin Vulnerabilities

Real Media Library < 4.18.29 - Author+ Stored XSS

Description

The plugin does not sanitise and escape the created folder names, which could allow users with the role of author and above to perform Stored Cross-Site Scripting attacks.

Proof of Concept

As a user with the author role, go to Media > Library and create a new folder with the following payload: "><img src onerror=alert(/XSS/)>

Then Add a new media (via Media > Add new), select the created folder with the payload, and upload a file, which will trigger the XSS. Any user using the malicious folder to upload files will have the XSS trigger

Affects Plugins

Fixed in 4.18.29

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Bipul Jaiswal from SecureLayer7
Submitter
Bipul Jaiswal from SecureLayer7
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-01-30 (about 1 years ago)
Added
2023-01-30 (about 1 years ago)
Last Updated
2023-01-30 (about 1 years ago)

Other