Lucene search

K
wpvulndbVikas SrivastavaWPVDB-ID:A3CD3115-2181-4E14-8B39-4DE096433847
HistoryJul 23, 2021 - 12:00 a.m.

Simple Post <= 1.1 - Authenticated Stored Cross-Site Scripting (XSS)

2021-07-2300:00:00
Vikas Srivastava
wpscan.com
7
wordpress 5.7.2
simple post plugin
authenticated stored cross-site scripting
xss payload
javascript payload
security issue

EPSS

0

Percentile

14.0%

The plugin does not sanitize user input when an authenticated user Text value, then it does not escape these values when outputting to the browser leading to an Authenticated Stored XSS Cross-Site Scripting issue.

PoC

1. Install WordPress 5.7.2 2. Install and activate Simple Post 3. Navigate to Settings >> Simple Post and enter the XSS payload into the Text input field. 4. Click Update Options. 5. You will observe that the payload successfully got stored into the database and when you are triggering the same functionality at that time JavaScript payload is executing successfully and we are getting a pop-up. 6. Payload Used: ">

EPSS

0

Percentile

14.0%

Related for WPVDB-ID:A3CD3115-2181-4E14-8B39-4DE096433847