Lucene search

K
wpexploitBob MatyasWPEX-ID:D8B76875-CF7F-43A9-B88B-D8AEFEFAB131
HistoryJul 24, 2023 - 12:00 a.m.

Custom Field For WP Job Manager < 1.2 - Admin+ Stored XSS

2023-07-2400:00:00
Bob Matyas
56
wp job manager
stored xss
field injection
cross-site scripting

AI Score

6

Confidence

High

EPSS

0.001

Percentile

24.0%

Description The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

To test, you also need to have WP Job Manager installed.

When adding a new field:

1. In the plugin settings, "Add a New Field" and for the "Field Name" use `" style=animation-name:rotation onanimationstart=alert(/XSS/)//` and save.
2. Edit the field you created and see the XSS.

When editing an existing field:

1. Edit a field
2. For the "Field Name" use `" style=animation-name:rotation onanimationstart=alert(/XSS/)//` and in the "OutPut" field enter `<script>alert(1)</script>`
3. Add a new job and go through the submission process. When previewing, the plugin does not sanitize the "OutPut" string, leading to an XSS.

AI Score

6

Confidence

High

EPSS

0.001

Percentile

24.0%

Related for WPEX-ID:D8B76875-CF7F-43A9-B88B-D8AEFEFAB131