Lucene search

K
wpvulndbZhangyunpeiWPVDB-ID:DFBC61EF-3FE4-4BAB-904A-480B073D4E88
HistoryDec 17, 2022 - 12:00 a.m.

Multi Step Form < 1.7.8 - Admin+ Stored XSS

2022-12-1700:00:00
zhangyunpei
wpscan.com
5
multi step form
admin
stored xss
cross-site scripting
vulnerability

EPSS

0.001

Percentile

25.4%

The plugin does not sanitise and escape some of its form fields, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

PoC

1. Create/edit a Form via the plugin. 2. Put the following payload: 1" onmouseover="alert(/XSS/)// in the field named โ€˜Step Titleโ€™, โ€˜Step Headlineโ€™, โ€˜Step descriptionโ€™, and โ€˜Sectionsโ€™. Fill in other information and save. The XSS will be triggered when editing the form and moving the mouse on the affected field, as well as in a page/post where the form is embedded and the mouse is moved over the text below the green flag.

EPSS

0.001

Percentile

25.4%

Related for WPVDB-ID:DFBC61EF-3FE4-4BAB-904A-480B073D4E88