CVSS Summary
Score | 4.9 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | Single |
Confidentiality | Partial |
Integrity | Partial |
Availability | None |
Last revised:
The theme contains JavaScript (assets/js/onLoad.js
) which iterates through .section-tabs a
and puts every href
value it finds into jQuery()
. jQuery()
doesn’t just search for elements which match a selector (i.e. jQuery('.section-tabs')
), it also creates elements (i.e. jQuery('<div>')
).
$('.section-tabs').simpleSlideTop(); // ... $.fn.simpleSlideTop = function(opts) { // ... contentID = $(this).attr('href'); $(contentID).hide();
An attacker without the unfiltered_html
capability would be able to inject arbitrary HTML as if they had the unfiltered_html
capability. With the ability to inject arbitrary HTML, the attacker is able add JavaScript which causes a logged-in administrator user to do almost anything – including creating new user accounts, deleting posts, and more.
Current state: Fixed
Score | 4.9 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | Single |
Confidentiality | Partial |
Integrity | Partial |
Availability | None |
unfiltered_html
capability)<div class="section-tabs"><a href="<img src=x onerror=alert(1)>">a</a></div>
For comparison, if the same user account enters <img src=x onerror=alert(1)>
or <script>alert(1)</script>
, it will be blocked by WordPress.
Upgrade to version 3.0.16 or later.