Hello,
1. Reflected Cross-Site Scripting (XSS)
Authenticated users (like editors) can inject html/js code (there is no CSRF protection!).
Method: GET
Vulnerable parameters: deletegc
Example PHP callstack:
wsc_gocodes_managemenu [/gocodes/menus.php:28]
Verification:
2. Blind SQL injection
Authenticated users (like editors) can execute arbitrary SQL commands (there is no CSRF protection!).
Method: GET
Vulnerable parameter: gcid
Example PHP callstack:
wsc_gocodes_managemenu [/gocodes/menus.php:79]
fake_wpdb::query
Verification:
There are similar SQL injections with the same parameter:
/gocodes/menus.php:63
/gocodes/menus.php:158
--
Regards,
Marcin Probola,