Lucene search

K
wpexploitWpvulndbWPEX-ID:8FAC612B-95D2-477A-A7D6-E5EC0BB9CA52
HistoryDec 13, 2019 - 12:00 a.m.

WordPress <= 5.3 - wp_kses_bad_protocol() Colon Bypass

2019-12-1300:00:00
wpvulndb
213

0.009 Low

EPSS

Percentile

82.5%

A JavaScript payload such as “javascript&colon;alert(1)” in a URL could cause a Cross-Site Scripting (XSS) vulnerability. According to the commit message (see references): “wp_kses_bad_protocol() makes sure to validate that uri attributes don’t contain invalid/or not allowed protocols. While this works fine in most cases, there’s a risk that by using the colon html5 named entity, one is able to bypass this function.”

javascript&colon;alert(1)

0.009 Low

EPSS

Percentile

82.5%