Lucene search

K
wpvulndbRamuel GallWPVDB-ID:1CBFDC6A-E308-4A9E-B995-413E7D19EA04
HistoryApr 02, 2020 - 12:00 a.m.

Contact Form 7 Datepicker <= 2.6.0 - Authenticated Stored Cross-Site Scripting (XSS)

2020-04-0200:00:00
Ramuel Gall
wpscan.com
7

0.001 Low

EPSS

Percentile

24.8%

Contact Form 7 Datepicker registers an AJAX action to save settings which calls a function that fails to perform a capability check or nonce check. As such, a logged-in attacker with minimal permissions (such as a subscriber) can send a crafted request which will store a malicious JavaScript in the plugin’s settings. The next time an authorized user created or modified a contact form, the stored JavaScript would be executed in their browser, which could be used to steal an administrator’s session or even create malicious administrative users.

PoC

The PoC will be displayed once the issue has been remediated

CPENameOperatorVersion
contact-form-7-datepickereq*

0.001 Low

EPSS

Percentile

24.8%

Related for WPVDB-ID:1CBFDC6A-E308-4A9E-B995-413E7D19EA04