WP Ticket < 5.10.4 - Admin+ Stored Cross-Site Scripting

less than 1 minute read

Description

The plugin does not sanitize or escape form fields before outputting it in the List, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

Proof of Concept

Navigate to WP Ticket > Forms > edit layout of "Open a Ticket" or "Search Tickets" > on "Editing Form" Setting menu.

Select a form field and you can edit the “Label” with a cross-site scripting (XSS) payload such as

v < 5.10.3 - "><script>alert(/XSS/)</script> 
v <= 5.10.3 - " style=animation-name:rotation onanimationstart=alert(/XSS/)//

All of the parameters on the “Editing Form” are vulnerable.To trigger the XSS payload, refresh the “Editing Form” page.

Timeline

  • Publicly Published : 2021-09-20 (about 11 days ago)
  • Added : 2021-09-20 (about 11 days ago)
  • Last Updated : 2021-09-20 (about 11 days ago)

Links

Tags:

Categories:

Updated: