NewStatPress <= 1.0.4 - Reflected Cross-Site Scripting (XSS)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The NewStatPress plugin utilizes on lines 28 and 31 of the file ‘includes/nsp_search.php’ several variables from the $_GET scope, without sanitation. While WordPress automatically escapes quotes on this scope, the outputs on these lines are outside of quotes, and as such can be utilized to trigger a Reflected XSS attack.
Proof of Concept
The following URL will trigger an alert box in FireFox when visited, should the user be logged in as an Administrative user.

http://localhost/wp-admin/admin.php?groupby1=checked%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29&page=nsp_search&newstatpress_action=search

Affects

Plugin newstatpress
fixed in version 1.0.6

References

URL https://research.g0blin.co.uk/g0blin-00057/

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter James Hooker
Submitter Website https://research.g0blin.co.uk
Submitter Twitter g0blinResearch
Views 100
Verified No
WPVDB ID 8081

Timeline

Publicly Published 2015-07-07 (over 1 year ago)
Added 2015-07-07 (over 1 year ago)
Last Updated 2015-07-07 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.