YOP Poll <= 5.7.3 - Reflected Cross-Site Scripting (XSS)Sign up to our free email alerts service for instant vulnerability notifications!
The YOP Poll plugin exposes a number of AJAX requests to the public (see lines 15-40 in th efile yop-poll/inc/admin.php). An XSS vulnerability has been found in at least one of these functions – namely yop_poll_set_wordpress_vote. This function is available to both registered and non-registered users. The fields that are vulnerable are Base64 encoded (see lines 859 to 912 of yop-poll/inc/admin.php), meaning any attacks performed will bypass not only the auto-escaping on quotes performed by WordPress/PHP, but also any XSS-prevention methods implemented by browsers.
|Proof of Concept||
fixed in version 5.7.4
|OWASP Top 10||A3: Cross-Site Scripting (XSS)|
|Publicly Published||2015-07-08 (almost 2 years ago)|
|Added||2015-07-08 (almost 2 years ago)|
|Last Updated||2015-07-08 (almost 2 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|