Lucene search

K
wpvulndbTh3.d1p4kWPVDB-ID:DB0B9480-2FF4-423C-A745-68E983FFA12B
HistoryNov 29, 2021 - 12:00 a.m.

Buttonizer - Smart Floating Action Button < 2.5.5 - Admin+ Stored Cross-Site Scripting

2021-11-2900:00:00
th3.d1p4k
wpscan.com
3

0.001 Low

EPSS

Percentile

24.8%

The plugin does not sanitise and escape some parameter before outputting them in attributes and page, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

PoC

Add/edit a new button, set its Button action to “Website URL” and add the following payload as URL: javascript:alert(/XSS/) As label, the following payload can be used as well: Publish it and the XSS will be triggered when viewing the page with the button (w/o user interaction for the XSS in the label field, while clicking on it for the XSS in the URL)

0.001 Low

EPSS

Percentile

24.8%

Related for WPVDB-ID:DB0B9480-2FF4-423C-A745-68E983FFA12B