WordPress WP-Contact-Widgets 1.4.1 Cross Site Scripting

2017.10.12
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: Stored XSS on wp-contact-widgets 1.4.1 wordpress plugin # Disclosure Date: 06/10/2017 # Exploit Author: Boumediene KADDOUR # Publisher: R&D Unit Algerie Telecom # Version: 1.4.1 # Application website: https://wordpress.org/plugins/contact-widgets/ <https://www.phpjabbers.com/free-rate-me-script/> # CVE : N/A The include/class-contact.php miss handles the address field where it provides the unfiltered_html capability to an authenticated user which gives him/her the ability to store JS code inside of the address field. Link to the PoC: https://github.com/godaddy/wp-contact-widgets/issues/46 Link to the fix: https://github.com/godaddy/wp-contact-widgets/commit/d5824c82860eb5e233054ed7448f817ebc4e390e


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top