CVSS Summary
Score | 5.8 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | None |
Confidentiality | Partial |
Integrity | Partial |
Availability | None |
Last revised:
The plugin’s settings page sends a nonce, and checks it when displaying the success/failure message, but is not checked when setting options.
This option is meant to contain JavaScript for Google Tag Manager, so it’s displayed on every frontend page without escaping.
As this vulnerability allows adding arbitrary JavaScript, the attacker can use it to control an admin user’s browser to do almost anything an admin user can do.
Current state: Fixed
Score | 5.8 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | None |
Confidentiality | Partial |
Integrity | Partial |
Availability | None |
Press submit on a page containing the following HTML snippet:
<form method="POST" action="http://localhost/wp-admin/options-general.php?page=metronet-tag-manager"> <input type="text" name="submit" value="1"> <input type="text" name="gtm-code-head" value="<script>alert(1)</script>"> <input type="submit"> </form>
In a real attack, the form can be made to autosubmit so the victim only has to follow a link.
Upgrade to version 1.2.9 or later.