The MULTIDOTS WooCommerce Quick Reports plugin 1.0.6 and earlier for WordPress is vulnerable to Stored XSS. It allows an attacker to inject malicious JavaScript code on the WooCommerce -> Orders admin page. The attack is possible by modifying the "referral_site" cookie to have an XSS payload, and placing an order.
References
Link | Resource |
---|---|
http://labs.threatpress.com/stored-cross-site-scripting-xss-in-woocommerce-quick-reports-plugin/ | Exploit Third Party Advisory |
http://labs.threatpress.com/stored-cross-site-scripting-xss-in-woocommerce-quick-reports-plugin/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.threatpress.com/stored-cross-site-scripting-xss-in-woocommerce-quick-reports-plugin/ - Exploit, Third Party Advisory |
Information
Published : 2018-06-01 15:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11485
Mitre link : CVE-2018-11485
CVE.ORG link : CVE-2018-11485
JSON object : View
Products Affected
multidots
- woocommerce_quick_reports
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')