Loading HuntDB...

HTML injection-WordCamp Talks plugin

Medium
I
Ian Dunn
Submitted None

Team Summary

Official summary from Ian Dunn

This report was about the possibility to inject malicious HTML into wp-admin via comments on the `talks` post type. Examples of malicious input were: * `<a href="http://www.google.com"><img src="http://www.google.com/intl/en_ALL/images/logo.gif"/></a>` * `<img src="https://storage.googleapis.com/gweb-uniblog-publish-prod/static/blog/images/google-200x200.7714256da16f.png" width="10000" height="10000" border="0" style="border: 0" />` The report suggested that those input could be used in phishing attacks, since the images would be displayed in wp-admin, where an administrator might click on the links and be lead to a malicious site. The report turned out to be invalid, because the comments were left while the user was logged in as an Administrator. [WordPress gives administrators the unfiltered_html capability, allowing them to post any HTML they would like](https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/#why-are-some-users-allowed-to-post-unfiltered-html).

Reported by paresh_parmar

Report Details

Additional information and metadata

State

Closed

Substate

Not-Applicable

Submitted

Weakness

Cross-site Scripting (XSS) - Generic