Lucene search

K
wpvulndbBob MatyasWPVDB-ID:A9A10D0F-D8F2-4F3E-92BF-94FC08416D87
HistoryApr 30, 2024 - 12:00 a.m.

Sailthru Triggermail <= 1.1 - Admin+ Stored XSS

2024-04-3000:00:00
Bob Matyas
wpscan.com
1
sailthru
triggermail
stored xss
admin
vulnerability
settings
cross-site scripting
multisite setup
update

7.7 High

AI Score

Confidence

High

Description The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

PoC

1. Go to https://example.com/wp-admin/options-general.php?page=sailthru&amp;action;=options 2. Enter the payload "&gt; for any of the inputs 3. Save and see the XSS

7.7 High

AI Score

Confidence

High

Related for WPVDB-ID:A9A10D0F-D8F2-4F3E-92BF-94FC08416D87