WordPress Plugin Vulnerabilities
All-in-One WP Migration < 7.0 - Authenticated Cross-Site Scripting (XSS)
Description
An attacker would already have to be able to either compromise the database or gain access to a user account with high enough privileges to view the backup history, so some damage has already been done, but such an attacker could then also insert some XSS in order to compromise other admin users.
When double-clicking the backup description on the backup history overview page, in order to edit the description text, the text is not sanitized/escaped via html entities when generating the input field.
This has been reported to the plugin author on 2 July 2019 and confirmed to be fixed in version 7.0 on 17 July 2019.
Proof of Concept
Browse to the backup history overview in the admin control panel and enter the following as the description text of a backup item. The JS will be executed the next time any admin user views that page: "><script>alert("XSS!");</script>
Affects Plugins
References
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Connum
Submitter
Connum
Verified
No
WPVDB ID
Timeline
Publicly Published
2019-07-17 (about 4 years ago)
Added
2019-07-17 (about 4 years ago)
Last Updated
2021-03-23 (about 3 years ago)