Lucene search

K
wpvulndbCyc707WPVDB-ID:3D15F589-956C-4C71-98B1-3BA89D22262C
HistoryMar 27, 2024 - 12:00 a.m.

Salon booking system < 9.6.3 - Unauthenticated Stored XSS

2024-03-2700:00:00
cyc707
wpscan.com
13
plugin vulnerability
unauthenticated attack
stored xss
admin context
booking system

5.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

Description The plugin does not properly sanitize and escape the ‘Mobile Phone’ field and ‘sms_prefix’ parameter when booking an appointment, allowing customers to conduct Stored Cross-Site Scripting attacks. The payload gets triggered when an admin visits the ‘Bookings’ page and the malicious script is executed in the admin context.

PoC

While booking an appointment, paste the following script in the “Mobile phone” field: " onmouseover=alert(1234);// Next, as an administrator view https://vulnerable-site.tld/wp-admin/edit.php?post_type=sln_booking, and hover your the Tel. part of that new entry’s username column. This can also be exploited by sending the sln[sms_prefix] parameter, which you may have to create in the form like so: While booking an appointment. Fill most fields with valid user information, then use your browser’s inspector to rename the “Address” input field’s name from sln[address] to sln[sms_prefix], and set its value to "onmousemove=alert(123);//.

CPENameOperatorVersion
eq9.6.3

5.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

Related for WPVDB-ID:3D15F589-956C-4C71-98B1-3BA89D22262C