WordPress Plugin Vulnerabilities
Async Javascript < 2.20.02.27 - Subscriber+ Stored XSS via Plugin Settings Change
Description
Async JavaScript’s settings are modified via calls to wp-admin/admin-ajax.php with the action aj_steps. This AJAX action is registered only for authenticated users, but no capabilities checks are made. Because of this, low-privilege users including Subscribers can modify the plugin’s settings.
Affects Plugins
References
Classification
Type
XSS
OWASP top 10
CWE
Miscellaneous
Original Researcher
Sean Murphy, QA Lead Matt Rusnak, and QA Engineer Ramuel Gall (Wordfence)
Verified
No
WPVDB ID
Timeline
Publicly Published
2020-02-27 (about 6 years ago)
Added
2020-02-28 (about 6 years ago)
Last Updated
2020-02-29 (about 6 years ago)