Lucene search

K
wpvulndbVaibhav RajputWPVDB-ID:078F33CD-0F5C-46FE-B858-2107A09C6B69
HistoryMar 20, 2023 - 12:00 a.m.

FluentForms < 4.3.25 - Contributor+ Stored XSS via Custom HTML Form Field

2023-03-2000:00:00
Vaibhav Rajput
wpscan.com
12
fluentforms
stored xss
html form
sanitation
javascript injection

EPSS

0.001

Percentile

21.4%

The plugin does not properly sanitize and escape the srcdoc attribute in iframes in it’s custom HTML field type, allowing a logged in user with roles as low as contributor to inject arbitrary javascript into a form which will trigger for any visitor to the form or admins previewing or editing the form.

PoC

As a contributor, create a blank form and add custom html field with the following content in the “Text” tab of the field editor:

Some description about this section

Do not decode the payload. And please ensure that payload is added when editor has Text tab selected. Save the form, it will trigger xss payload.

EPSS

0.001

Percentile

21.4%

Related for WPVDB-ID:078F33CD-0F5C-46FE-B858-2107A09C6B69