Lucene search

K
wpvulndbJeremie AmsellemWPVDB-ID:F426360E-5BA0-4D6B-BFD4-61BC54BE3469
HistoryDec 21, 2021 - 12:00 a.m.

Backup and Staging by WP Time Capsule < 1.22.7 - Reflected Cross-Site Scripting

2021-12-2100:00:00
Jeremie Amsellem
wpscan.com
17
cross-site scripting
wp time capsule
admin page.

EPSS

0.001

Percentile

31.7%

The plugin does not sanitise and escape the error parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting

PoC

Once the “Server Requirements” are passed in the initial setup process (you can bypass the check for localhosts by editing the is_localhost function in the same file for testing purpose) the vulnerability can be triggered at any time in an admin’s panel using an URI with JavaScript content inserted in the error parameter such as : https://example.com/wp-admin/admin.php?page=wp-time-capsule&amp;error;=">&cloud;_auth_action=g_drive

EPSS

0.001

Percentile

31.7%

Related for WPVDB-ID:F426360E-5BA0-4D6B-BFD4-61BC54BE3469