Lucene search

K
wpexploitBob MatyasWPEX-ID:31F401C4-735A-4EFB-B81F-AB98C00C526B
HistoryApr 26, 2024 - 12:00 a.m.

Popup4Phone <= 1.3.2 - Editor+ Stored XSS

2024-04-2600:00:00
Bob Matyas
25
popup4phone
editor+
stored xss
exploit
security update
may 10 2024

5.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.9%

Description The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as Editor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

1. Go to "Popup4Phone > Settings > Form"
2. In the "Message for show during form submission" field add the payload `</textarea><script>alert(/XSS: popup4phone_form_message_sending/)</script>`
3. Save the changed and view the form on the frontend to see the XSS

5.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.9%

Related for WPEX-ID:31F401C4-735A-4EFB-B81F-AB98C00C526B