Duplicate Page < 4.4.3 - Admin+ Stored Cross-Site Scripting

ID WPVDB-ID:9EBDD1DF-1D6F-4399-8B0F-77A79F841464
Type wpvulndb
Reporter Nikhil Kapoor from EsecForte
Modified 2021-09-08T15:36:17


The plugin does not sanitise or escape the Duplicate Post Suffix settings before outputting it, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. The attempt to fix the issue in 4.4.2 is insufficient and still allows for XSS.


Put the following payload in the Duplicate Post Suffix setting of the plugin: - v < 4.4.2: "> - v < 4.4.3: " style=animation-name:rotation onanimationstart=alert(/XSS/)//