Lucene search

K
wpexploitTri Wanda SeptianWPEX-ID:41A2C72C-7DB1-473A-8844-47F6AE9D0594
HistorySep 20, 2021 - 12:00 a.m.

WP Ticket < 5.10.4 - Admin+ Stored Cross-Site Scripting

2021-09-2000:00:00
Tri Wanda Septian
62

0.001 Low

EPSS

Percentile

24.8%

The plugin does not sanitize or escape form fields before outputting it in the List, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

Navigate to WP Ticket > Forms >  edit layout of "Open a Ticket" or "Search Tickets" > on "Editing Form" Setting menu.

Select a form field and you can edit the "Label" with a cross-site scripting (XSS) payload such as
v < 5.10.3 - "><script>alert(/XSS/)</script> 
v <= 5.10.3 - " style=animation-name:rotation onanimationstart=alert(/XSS/)//

All of the parameters on the "Editing Form" are vulnerable.

To trigger the XSS payload, refresh the "Editing Form" page.

0.001 Low

EPSS

Percentile

24.8%

Related for WPEX-ID:41A2C72C-7DB1-473A-8844-47F6AE9D0594