Lucene search

K
wpvulndbNicoloWPVDB-ID:A2CB7167-9EDC-4640-87EB-4C511639E5B7
HistoryApr 03, 2024 - 12:00 a.m.

Better Comments < 1.5.6 - Subscriber+ Stored XSS

2024-04-0300:00:00
Nicolo
wpscan.com
4
plugin
vulnerability
stored xss
subscribers
update
april 17 2024

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

Description The plugin does not sanitise and escape some of its settings, which could allow low privilege users such as Subscribers to perform Stored Cross-Site Scripting attacks.

PoC

1. From the menu on the left, go into “Users” and edit Subscriber user. 2. Upload a new avatar image and click “Update User”. 3. Change the nickname to the following payload and click “Update User” as before: "onload="prompt(‘XSS’) 4. Payload is triggered immediately on Profile menu. 5. Open any post as the Subscriber user and leave a comment to trigger the payload. 6. Everywhere where the avatar is used, the payload is triggered. For example, consider the avatar is always used in the top right corner besides the username on any WordPress page or post.

CPENameOperatorVersion
eq1.5.6

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

Related for WPVDB-ID:A2CB7167-9EDC-4640-87EB-4C511639E5B7