WordPress Plugin Vulnerabilities

Qubely < 1.8.5 - Contributor+ Stored XSS

Description

The plugin does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.

Proof of Concept

Add the following Additional CSS class(es) to the "Post Grid" Gutenberg block:
" onmouseover="alert(1)" style="background:red;"

Affects Plugins

Fixed in 1.8.5

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Lana Codes
Submitter
Lana Codes
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-01-02 (about 1 years ago)
Added
2023-02-14 (about 1 years ago)
Last Updated
2023-02-14 (about 1 years ago)

Other