CVSS Summary
| Score | 4.9 Medium |
|---|---|
| Vector | Network |
| Complexity | Medium |
| Authentication | Single |
| Confidentiality | Partial |
| Integrity | Partial |
| Availability | None |
Last revised:
The theme contains JavaScript (assets/js/onLoad.js) which iterates through .section-tabs a and puts every href value it finds into jQuery(). jQuery() doesn’t just search for elements which match a selector (i.e. jQuery('.section-tabs')), it also creates elements (i.e. jQuery('<div>')).
$('.section-tabs').simpleSlideTop(); // ... $.fn.simpleSlideTop = function(opts) { // ... contentID = $(this).attr('href'); $(contentID).hide();
An attacker without the unfiltered_html capability would be able to inject arbitrary HTML as if they had the unfiltered_html capability. With the ability to inject arbitrary HTML, the attacker is able add JavaScript which causes a logged-in administrator user to do almost anything – including creating new user accounts, deleting posts, and more.
Current state: Fixed
| Score | 4.9 Medium |
|---|---|
| Vector | Network |
| Complexity | Medium |
| Authentication | Single |
| Confidentiality | Partial |
| Integrity | Partial |
| Availability | None |
unfiltered_html capability)<div class="section-tabs"><a href="<img src=x onerror=alert(1)>">a</a></div>For comparison, if the same user account enters <img src=x onerror=alert(1)> or <script>alert(1)</script>, it will be blocked by WordPress.
Upgrade to version 3.0.16 or later.