Lucene search

K
wpvulndbPriyanka PandeWPVDB-ID:B3A0BB3F-50B2-4DCB-B23C-B08480363A4A
HistoryMar 27, 2024 - 12:00 a.m.

Salon Booking System < 9.6.3 - Unauthenticated Stored XSS

2024-03-2700:00:00
Priyanka Pande
wpscan.com
4
unauthenticated stored xss
salon booking system
admin context

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin does not properly sanitize and escape the ‘Mobile Phone’ field when booking an appointment, allowing customers to conduct Stored Cross-Site Scripting attacks. The payload gets triggered when an admin visits the ‘Customers’ page and the malicious script is executed in the admin context.

PoC

1. As a first time customer, book an appointment by visiting the booking page http://localhost/booking/ 2. At Step 5/7, enter details such as First name, Last name, E-mail and Address. In the Mobile phone field, enter the payload 3. Enter the password and proceed to the next step. Once the booking process is complete, an account gets created for the customer. 4. Login as admin and visit the customers page http://localhost/wp-admin/admin.php?page=salon-customers

CPENameOperatorVersion
eq9.6.3

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for WPVDB-ID:B3A0BB3F-50B2-4DCB-B23C-B08480363A4A