WordPress MiwoFTP Plugin 1.0.5 Multiple CSRF XSS Vulnerabilities

ID ZSL-2015-5241
Type zeroscience
Reporter Gjoko Krstic
Modified 2015-04-14T00:00:00


Title: WordPress MiwoFTP Plugin 1.0.5 Multiple CSRF XSS Vulnerabilities
Advisory ID: ZSL-2015-5241
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 14.04.2015


MiwoFTP is a smart, fast and lightweight file manager plugin that operates from the back-end of WordPress.


MiwoFTP WP Plugin suffers from multiple cross-site request forgery and xss vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several GET/POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.


Miwisoft LLC - <http://www.miwisoft.com>

Affected Version


Tested On

Apache 2.4.10 (Win32)
PHP 5.6.3
MySQL 5.6.21

Vendor Status

[24.03.2015] Vulnerability discovered.
[25.03.2015] Vendor contacted.
[25.03.2015] Vendor responds asking more details.
[26.03.2015] Sent details to the vendor.
[27.03.2015] Vendor forwarded details to developers.
[30.03.2015] Vendor confirms vulnerability scheduling patch by end of week.
[31.03.2015] Replied to the vendor.
[09.04.2015] Asked vendor for status update.
[12.04.2015] No reply from the vendor.
[13.04.2015] Asked vendor for status update.
[13.04.2015] Vendor replies promising patch by end of week.
[14.04.2015] Vendor releases version 1.0.6 to address these issues.
[14.04.2015] Coordinated public security advisory released.




Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>


[1] <http://miwisoft.com/wordpress-plugins/miwoftp-wordpress-file-manager#changelog>
[2] <http://www.exploit-db.com/exploits/36762/>
[3] <http://cxsecurity.com/issue/WLB-2015040071>
[4] <http://packetstormsecurity.com/files/131435>
[5] <http://osvdb.org/show/osvdb/120798>
[6] <https://exchange.xforce.ibmcloud.com/vulnerabilities/102433>
[7] <https://exchange.xforce.ibmcloud.com/vulnerabilities/102434>


[14.04.2015] - Initial release
[16.04.2015] - Added reference [2], [3], [4] and [5]
[22.04.2015] - Added reference [6] and [7]


Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: lab@zeroscience.mk

                                            &lt;html&gt;&lt;head&gt;&lt;title&gt;403 Nothing to see.&lt;/title&gt;
&lt;link rel="Shortcut Icon" href="favicon.ico" type="image/x-icon"&gt;
&lt;style type="text/css"&gt;
body {
	background-color: #000;
body,td,th {
	font-family: Verdana, Geneva, sans-serif;
a:link {
	color: #008FEF;
	text-decoration: none;
a:visited {
	color: #008FEF;
	text-decoration: none;
a:hover {
	text-decoration: underline;
	color: #666;
a:active {
	text-decoration: none;
&lt;body bgcolor=black&gt;
&lt;font color="#7E88A3" size="2"&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;h1&gt;403 Nothing to see.&lt;/h1&gt;

You do not have the powah for this request /403.shtml&lt;br /&gt;&lt;br /&gt;
&lt;font size="2"&gt;&lt;a href="https://www.zeroscience.mk"&gt;https://www.zeroscience.mk&lt;/a&gt;&lt;/font&gt;