CM Pop-Up banners < 1.4.11 - Authenticated Stored XSS

2020-03-27T00:00:00
ID WPVDB-ID:10154
Type wpvulndb
Reporter Jeroen Mulder
Modified 2020-03-28T06:00:08

Description

When saving a new campaign, a user with edit_pages capabilities can store scripts in the campaign’s pop-up content. The code can then be executed on every page on the website.

PoC

A user with the edit_pages capability can store any script in the pop-up's content. The content is serialized and then saved as post_meta. Script tags are stripped, but on viewing the pop-up, the content is unserialized and script tags are added again. If the checkbox to show the popup on every page is checked, the script will be executed on every page. The editing function is accessible for the administrator and editor role, so any website with this plugin activated under version 1.4.10 and with a vulnerable user role from editor up, is vulnerable to site-wide XSS hacks. PoC video: https://www.youtube.com/watch?v=0T7sHJwkP5o