WordPress Plugin Vulnerabilities
WP Customer Reviews < 3.5.6 - Authenticated Stored Cross-Site Scripting (XSS)
Description
The plugin did not sanitise some of its settings, allowing high privilege users such as administrators to set XSS payloads in them which will then be triggered in pages where reviews are enabled
Proof of Concept
1. Login to WordPress as an Administrator 2. Install and Activate plugin "WP Customer Reviews" 3. Click on "Reviews > Plugin Settings > Review Form Settings" 4. Insert the XSS payload (my XSS payload: <img src=x onerror=alert(1)>) into any field at "Standard fields on reviews" or/and "Custom fields on reviews", then click on "Save Changes". 5. Go to any post where Reviews are enabled to trigger the XSS
Affects Plugins
References
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Truoc Phan from Techlab Corporation
Submitter
Truoc Phan
Submitter website
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-05-04 (about 3 years ago)
Added
2021-05-04 (about 3 years ago)
Last Updated
2021-05-05 (about 3 years ago)