I found that your plugin is vulnerable to stored cross-site scripting during my security research on wordpress plugins that have more than 200,000+ active installations.
I wish there are a security policy for this plugin to report it. I didn't find another way.
Note this is affecting the last version 3.1.2, didn't check if the others are vulnerable or not.
as can be seen in templates\settings-page.php
pubsubhubbub_endpoints will print output unsanitized from dangerous HTML chars [ < > }. Therefore, a malicious actor can escape </textarea> and inject malicious javascript code on the client-side.
Proof of Concept
Login and send the following request by navigating to wp-admin/options-general.php?page=pubsubhubbub
I found that your plugin is vulnerable to stored cross-site scripting during my security research on wordpress plugins that have more than 200,000+ active installations.
I wish there are a security policy for this plugin to report it. I didn't find another way. Note this is affecting the last version 3.1.2, didn't check if the others are vulnerable or not. as can be seen in templates\settings-page.php
pubsubhubbub_endpoints will print output unsanitized from dangerous HTML chars [ < > }. Therefore, a malicious actor can escape
</textarea>
and inject malicious javascript code on the client-side.Proof of Concept
As can be seen , payload is
%3C%2Ftextarea%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E
will simply escape<textarea
and inject javascript.That will result in stored XSS in /wp-admin/options-general.php?page=pubsubhubbub endpoint.
Redemption
Simply escape the chars with
esc_html()
or something similar.templates\settings-page.php
That will result in