WordPress Plugin Vulnerabilities
Real Media Library < 4.18.29 - Author+ Stored XSS
Description
The plugin does not sanitise and escape the created folder names, which could allow users with the role of author and above to perform Stored Cross-Site Scripting attacks.
Proof of Concept
As a user with the author role, go to Media > Library and create a new folder with the following payload: "><img src onerror=alert(/XSS/)> Then Add a new media (via Media > Add new), select the created folder with the payload, and upload a file, which will trigger the XSS. Any user using the malicious folder to upload files will have the XSS trigger
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Bipul Jaiswal from SecureLayer7
Submitter
Bipul Jaiswal from SecureLayer7
Submitter website
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-01-30 (about 1 years ago)
Added
2023-01-30 (about 1 years ago)
Last Updated
2023-01-30 (about 1 years ago)