WordPress Plugin Vulnerabilities

Async Javascript < 2.20.02.27 - Subscriber+ Stored XSS via Plugin Settings Change

Description

Async JavaScript’s settings are modified via calls to wp-admin/admin-ajax.php with the action aj_steps. This AJAX action is registered only for authenticated users, but no capabilities checks are made. Because of this, low-privilege users including Subscribers can modify the plugin’s settings.

Affects Plugins

Fixed in 2.20.02.27

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Sean Murphy, QA Lead Matt Rusnak, and QA Engineer Ramuel Gall (Wordfence)
Verified
No

Timeline

Publicly Published
2020-02-27 (about 6 years ago)
Added
2020-02-28 (about 6 years ago)
Last Updated
2020-02-29 (about 6 years ago)

Other