Title: Reflected XSS in wordpress plugin theme-options v0.7 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/theme-options |
Downloads: 18057 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: theme-options |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./theme-options/snippets/Image_Management/Image_Management.php:
76: <td><input type="text" class="regular-text" value="<?php if (!isset($add_group_error)) echo $_POST['newname']; ?>" name="newname"/></td>
80: <td><input type="text" class="regular-text" value="<?php if (!isset($add_group_error)) echo $_POST['newdescription']; ?>" name="newdescription"/></td>
85: <input type="text" class="regular-text" value="<?php if (!isset($add_group_error)) echo $_POST['newtags']; ?>" name="newtags"/>
The variable newname appears to send unsanitized data back to the users browser via POST request.
|
CVE-ID: Not Released |
File:./theme-options/snippets/Image_Management/Image_Management.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|