Lucene search

K
wpexploitAsif Nawaz MinhasWPEX-ID:38053E05-4B17-4FA9-ACD3-85D8529B202B
HistoryAug 30, 2021 - 12:00 a.m.

Cookie Notice & Compliance for GDPR / CCPA < 2.1.2 - Admin+ Stored Cross-Site Scripting

2021-08-3000:00:00
Asif Nawaz Minhas
482
cookie notice
compliance
gdpr
ccpa
cross-site scripting
exploit

EPSS

0.001

Percentile

24.8%

The plugin does not escape the value of its Button Text setting when outputting it in an attribute in the frontend, allowing high privilege users such as admin to perform Cross-Site Scripting even when the unfiltered_html capability is disallowed.

Put the following payload in the Button text setting of the plugin (in the Notice Setting section)
" style=animation-name:twentytwentyone-close-button-transition onanimationend=alert(/XSS/)//
"onmouseover=alert(/XSS/)//

Then go on any page of the frontend to trigger the XSS (which may require some user interaction depending on the payload/theme used)

EPSS

0.001

Percentile

24.8%

Related for WPEX-ID:38053E05-4B17-4FA9-ACD3-85D8529B202B