The plugin does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Add the “EDD Buy Button” Gutenberg block to a post and put the payload below in the “Additional CSS class(es)” advanced block settings: " onmouseover=“alert(/XSS/)” style=“background:red;” Note: At least one Download need to exist for the issue to trigger.
CPE | Name | Operator | Version |
---|---|---|---|
easy-digital-downloads | lt | 3.1.0.5 |