Stored XSS in wordpress.com
High
A
Automattic
Submitted None
Actions:
Reported by
adhamsadaqah
Vulnerability Details
Technical details and impact analysis
## Summary:
Stored XSS as a comment or as a post (body or title) at
`https://wordpress.com/read/feeds/{blog_id}/posts/{post_id}`
`https://yoursubdomain.wordpress.com`
using the payload:
```
<iframe <><a href=javascript:alert(document.cookie)>Click Here</a>=></iframe>
```
## Steps To Reproduce:
- As a comment
1. Log in to wordpress.com
2. Choose a post from the feeds
3. Add a comment with the payload:
`<iframe <><a href=javascript:alert(document.cookie)>Click Here</a>=></iframe>`
4. By clicking on `Click Here`, an alert will fire with cookies of the domain `wordpress.com`
- As a post
1. Log in to wordpress.com
2. Create a new post or site.
3. Add the payload `<iframe <><a href=javascript:alert(document.cookie)>Click Here</a>=></iframe>` to the body or the title of the blog post
4. preview or publish your new blog post
5. By clicking on `Click Here`, an alert will fire with cookies of the domain `yoursubdomain.wordpress.com` or `wordpress.com` if the post is previewed from the WordPress feed.
6. If you add comments to your blog post and using the payload mentioned above as a comment an Stored XSS alert will fire when you click on the link.
## Impact
- Perform arbitrary requests on the behalf of other users with security context of wordpress.com or blogsubdomain.wordpress.com
- Read any data the attacked user has access to.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored