The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admins. The hiweb-migration-simple plugin is vulnerable to POST based XSS on endpoint http://172.28.128.6/wordpress/wp-admin/tools.php?page=hw_migration_simple via POST parameter old_domain
. This happens because of improper handling of user supplied input that is reflected on the page.
1. Login as Admin. 2. Open the .html file in the same browser session.
3. XSS will be triggered.
CPE | Name | Operator | Version |
---|---|---|---|
hiweb-migration-simple | eq | * |