The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
1. Login as Admin. 2. Go to https://example.com/wp-admin/options-general.php?page=bizlibrary and click on settings. 3. Insert the payload "> in the access key input field. 4. Hit save and XSS will be triggered.
CPE | Name | Operator | Version |
---|---|---|---|
bizlibrary | eq | * |