Caldera Forms <= 1.5.4 - Authenticated Cross-Site Scripting (XSS)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
Version 1.5.4 and earlier of Caldera Forms is vulnerable to a reflected cross-site scripting vulnerability in the “edit” parameter, which is not properly escaped before being printed in an HTML attribute. An attacker can use this to craft URLs that, when clicked, result in malicious JavaScript being executed. Because Caldera Forms uses ‘wp_rest’ nonces to access the WordPress REST API – a common practice among plugin developers – this Javascript may include anything the user is capable of doing in the REST API.
Proof of Concept
[site_url]/wp-admin/admin.php?page=caldera-forms&edit="><script>alert(String.fromCharCode(88%2C83%2C83))<%2Fscript> (1.5.3-4)

[site_url]/wp-admin/admin.php?page=caldera-forms&edit=CF598a16cde8524%3Cimg+url%3D%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E [<1.5.3]

Affects Plugin

fixed in version 1.5.5

References

URL https://wrbrand.com/2017/08/08/authenticated-xss-in-caldera-forms-1-5-4/
URL https://calderaforms.com/updates/caldera-forms-1-5-5/

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter Will Brand
Submitter Website https://wrbrand.com/
Submitter Twitter wrbrand
Views 73
Verified No
WPVDB ID 8940

Timeline

Publicly Published 2017-09-08 (2 months ago)
Added 2017-10-30 (20 days ago)
Last Updated 2017-10-30 (20 days ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.