Royal Slider <= 3.2.6 - Authenticated Cross-Site Scripting (XSS)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The vulnerability exists due to insufficient sanitation of user-supplied data in "rstype" HTTP GET parameter when creating / editing a slider.

A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
Proof of Concept
http://www.example.com/wp-admin/admin.php?page=new_royalslider&action=edit&rstype="><script>alert(String.fromCharCode(88,83,83))</script>

Affects

Plugin royal-slider
fixed in version 3.2.7

References

URL http://dimsemenov.com/plugins/royal-slider/wordpress/

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter Gerard Arall
Submitter Website github.com/arall
Views 307
Verified No
WPVDB ID 8182

Timeline

Publicly Published 2015-09-12 (about 1 year ago)
Added 2015-09-13 (about 1 year ago)
Last Updated 2015-09-13 (about 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.