NewStatPress <= 1.0.4 - Reflected Cross-Site Scripting (XSS)Sign up to our free email alerts service for instant vulnerability notifications!
The NewStatPress plugin utilizes on lines 28 and 31 of the file ‘includes/nsp_search.php’ several variables from the $_GET scope, without sanitation. While WordPress automatically escapes quotes on this scope, the outputs on these lines are outside of quotes, and as such can be utilized to trigger a Reflected XSS attack.
|Proof of Concept||
The following URL will trigger an alert box in FireFox when visited, should the user be logged in as an Administrative user. http://localhost/wp-admin/admin.php?groupby1=checked%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29&page=nsp_search&newstatpress_action=search
fixed in version 1.0.6
|OWASP Top 10||A3: Cross-Site Scripting (XSS)|
|Publicly Published||2015-07-07 (about 2 years ago)|
|Added||2015-07-07 (about 2 years ago)|
|Last Updated||2015-07-07 (about 2 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|