Hello,
1. Reflected Cross-Site Scripting (XSS)
Authenticated users (like subscribers) can inject html/js code (there is no CSRF protection).
Method: GET
Vulnerable parameters: file
Example PHP callstack:
PluginCentral::dash [/plugin-central/plugin-central.class.php:192]
PluginCentral::delete_plugin [/plugin-central/plugin-central.class.php:785]
PluginCentral::_flush [/plugin-central/plugin-central.class.php:823]
Verification:
2. Reflected Cross-Site Scripting (XSS)
Authenticated users (like subscribers) can inject html/js code (there is no CSRF protection).
Method: GET
Vulnerable parameters: name
Example PHP callstack:
PluginCentral::dash [/plugin-central/plugin-central.class.php:213]
Verification:
--
Regards,
Marcin Probola,