Description The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
To test, you also need to have WP Job Manager installed. When adding a new field: 1. In the plugin settings, “Add a New Field” and for the “Field Name” use " style=animation-name:rotation onanimationstart=alert(/XSS/)//
and save. 2. Edit the field you created and see the XSS. When editing an existing field: 1. Edit a field 2. For the “Field Name” use " style=animation-name:rotation onanimationstart=alert(/XSS/)//
and in the “OutPut” field enter `` 3. Add a new job and go through the submission process. When previewing, the plugin does not sanitize the “OutPut” string, leading to an XSS.
CPE | Name | Operator | Version |
---|---|---|---|
custom-field-for-wp-job-manager | eq | 1.2 |