Lucene search

K
wpexploitJonathan ZamoraWPEX-ID:A642F313-CC3E-4D75-B207-1DCEB6A7FBAE
HistoryOct 16, 2023 - 12:00 a.m.

Ninja Forms < 3.6.34 - Admin+ Stored XSS

2023-10-1600:00:00
Jonathan Zamora
52
ninja forms
wordpress
stored xss
admin
unfiltered_html capability
form settings
text field
field label
code injection
frontend
backend exploit

AI Score

5.6

Confidence

High

EPSS

0

Percentile

14.0%

Description The plugin does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue

1.      Install and activate the Ninja Forms WordPress
2.      As an admin with the unfiltered_html capability, create a new form.
3.      In the form settings, add a new text field.
4.      In the field label, enter the following code: <img src=x onerror=alert(1)>, or Name<a href=javascript:alert(/XSS-1/) onfocus=alert(/XSS-2/) autofocus>ClickME, maybe</a>
5.      Save the form.

The XSS will be triggered when viewing the form in the frontend, as well as when editing the form in the backend

AI Score

5.6

Confidence

High

EPSS

0

Percentile

14.0%

Related for WPEX-ID:A642F313-CC3E-4D75-B207-1DCEB6A7FBAE