High-Tech Bridge Security Research Lab discovered vulnerability in MaxButtons WordPress plugin, which can be exploited to perform Cross-Site Scripting (XSS) attacks against logged-in administrator.
Input passed via the “id” HTTP GET parameter to “/wp-admin/admin.php” script is not properly sanitised before being returned to the user. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
The exploitation example below uses the “alert()” JavaScript function to display “immuniweb” word:
http://wordpress/wp-admin/admin.php?page=maxbuttons-controller&action=button &id=%27%22%3E%3Cscript%3Ealert%28/immuniweb/%29;%3C/script%3E
CPE | Name | Operator | Version |
---|---|---|---|
maxbuttons wordpress plugin | le | 1.26.0 |