Hello,
1. Reflected Cross-Site Scripting (XSS)
Authenticated users (like editors) can inject html/js code (there is no CSRF protection!). Please note that plugin configuration value "File browser" needs to be set to "Built-in (old)" for succesful exploitation.
Method: GET
Vulnerable parameters: CKEditorFuncNum
Example PHP callstack:
SendUploadResults [/ckeditor-for-wordpress/filemanager/connectors/php/io.php:301]
Verification:
--
Regards,
Marcin Probola,