WordPress Plugin Vulnerabilities

Pretty Url <= 1.5.4 - Admin+ Stored XSS in plugin settings

Description

Plugin does not sanitize and escape the URL field in the plugin settings, which could allow high-privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

Proof of Concept

1. In the "Enter the URL: field, add the XSS payload `<img src=x onerror=alert(1)>` and save
2. Payload will be executed upon reload.

Affects Plugins

No known fix

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Shezad Master
Submitter
Shezad Master
Verified
Yes

Timeline

Publicly Published
2023-04-18 (about 1 years ago)
Added
2023-04-18 (about 1 years ago)
Last Updated
2023-04-18 (about 1 years ago)

Other