Lucene search

K
wpexploitJrXnmWPEX-ID:51E57F25-B8B2-44CA-9162-D7328EAC64EB
HistoryMar 15, 2022 - 12:00 a.m.

Post Grid < 2.1.16 - Reflected Cross-Site Scripting via keyword

2022-03-1500:00:00
JrXnm
95
post grid
cross-site scripting
reflected
keyword search
twentytwentytwo
payload
vulnerability
exploit

EPSS

0.001

Percentile

40.2%

The plugin does not escape the keyword parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting in pages containing a Post Grid with a search form

Append the following payload on a page containing a Post Grid with a search form: ?keyword="+onmouseover=alert(/XSS/)+t="

Then move the mouse over the Search field to trigger the XSS.

Depending on the theme used, other payload can be used, w/o user interaction, for example with the TwentyTwentyTwo one: ?keyword="+style=animation-name:twentytwentyone-close-button-transition+onanimationend=alert(/XSS/)//

EPSS

0.001

Percentile

40.2%

Related for WPEX-ID:51E57F25-B8B2-44CA-9162-D7328EAC64EB