Lucene search

K
wpvulndbTri Wanda SeptianWPVDB-ID:41A2C72C-7DB1-473A-8844-47F6AE9D0594
HistorySep 20, 2021 - 12:00 a.m.

WP Ticket < 5.10.4 - Admin+ Stored Cross-Site Scripting

2021-09-2000:00:00
Tri Wanda Septian
wpscan.com
4

0.001 Low

EPSS

Percentile

24.8%

The plugin does not sanitize or escape form fields before outputting it in the List, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

PoC

Navigate to WP Ticket > Forms > edit layout of “Open a Ticket” or “Search Tickets” > on “Editing Form” Setting menu. Select a form field and you can edit the “Label” with a cross-site scripting (XSS) payload such as v < 5.10.3 - "> v <= 5.10.3 - " style=animation-name:rotation onanimationstart=alert(/XSS/)// All of the parameters on the “Editing Form” are vulnerable. To trigger the XSS payload, refresh the “Editing Form” page.

CPENameOperatorVersion
wp-ticketlt5.10.4

0.001 Low

EPSS

Percentile

24.8%

Related for WPVDB-ID:41A2C72C-7DB1-473A-8844-47F6AE9D0594