Hello,
1. Reflected Cross-Site Scripting (XSS)
Authenticated administrators can store html/js code (there is no CSRF protection).
Method: GET
Vulnerable parameters: id[hookname], id[sig], id[next_run], id[args][code]
Example PHP callstack:
Crontrol::admin_manage_page [/wp-crontrol/wp-crontrol.php:668]
Crontrol::show_cron_form [/wp-crontrol/wp-crontrol.php:501]
Verification:
--
Regards,
Marcin Probola,