Closed VernonGrant closed 8 months ago
With the changes implemented in v0.89.4 in the pagination code: https://github.com/picandocodigo/List-Category-Posts/commit/2af44e364a83fafbd17f385c06267e5f57750bec#diff-c6c0a5f1ff13fafc11629987ac884d68a0784f66a2e0251821fac4f10e11bc09L137-R137
the generated url is safe no matter what characters are added to it, this means the issue described above is not a security vulnerability. Nevertheless, to make it work cleaner, we will still implement validation proposed in #502
Hi, we discovered a potential cross-site scripting vulnerability in regards to the pagination
lcp_page0
query parameter. To be clear, the injected script is still hex encoded on the client side, so there's no immediate risk at this stage. Regardless, the result is an unnecessary risk.Expected behavior
I would expect additional non numerical information that's passed to the
lcp_page0
query parameter to be disregarded. So when I pass the following value as a page number:The pagination output should look like this:
Actual behavior
But the actual behavior for the following:
Is having the additional data added to the pagination links.
Versions