An XSS issue was discovered in the slickquiz plugin through 1.3.7.1 for WordPress. The save_quiz_score functionality available via the /wp-admin/admin-ajax.php endpoint allows unauthenticated users to submit quiz solutions/answers, which are stored in the database and later shown in the WordPress backend for all users with at least Subscriber rights. Because the plugin does not properly validate and sanitize this data, a malicious payload in either the name or email field is executed directly within the backend at /wp-admin/admin.php?page=slickquiz across all users with the privileges of at least Subscriber.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154439/WordPress-SlickQuiz-1.3.7.1-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
https://wordpress.org/plugins/slickquiz/#developers | Product |
Configurations
History
No history.
Information
Published : 2019-09-13 13:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-12517
Mitre link : CVE-2019-12517
CVE.ORG link : CVE-2019-12517
JSON object : View
Products Affected
slickquiz_project
- slickquiz
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')