Lucene search

K
wpvulndbRamuel GallWPVDB-ID:6E4E22DD-D04A-4CCE-9F45-2592158449E6
HistoryAug 03, 2020 - 12:00 a.m.

Newsletter < 6.8.2 - Authenticated Cross-Site Scripting (XSS)

2020-08-0300:00:00
Ramuel Gall
wpscan.com
8

0.001 Low

EPSS

Percentile

32.3%

Newsletter suffers from an Authenticated Reflected Cross-Site Scripting(XSS) vulnerability via the ‘tnpc_render’ AJAX action found in newsletter/emails/emails.php. Due to how the corresponding ‘tnpc_render_callback‘ function decodes input via the ‘restore_options_from_request’ function and renders them via the ‘render_block’ function, it is possible to use this function to render arbitrary JavaScript in several ways when sending a POST request to wp-admin/admin-ajax.php with the ‘action’ POST parameter set to ‘tnpc_render’: In an array element of the ‘options’ parameter - for example, by sending a request with the ‘b’ parameter set to ‘html’, and the ‘options[html]’ parameter set to arbitrary JavaScript In the ‘encoded_options’ parameter - for example by sending a request with the ‘b’ parameter set to ‘html’, the ‘options’ parameter set an empty array (e.g. options[]=&) and the ‘encoded_options’ parameter set to a base64-encoded JSON string containing the arbitrary JavaScript in the ‘html’ element.

CPENameOperatorVersion
newsletterlt6.8.2

0.001 Low

EPSS

Percentile

32.3%

Related for WPVDB-ID:6E4E22DD-D04A-4CCE-9F45-2592158449E6