Hello,
1. Cross-Site Scripting (XSS)
Authenticated users (like subscribers) can inject html/js code.
Method: POST
Vulnerable parameters: id_base, widget_number, instance (proper json with payload in 'other_ids' key)
Example PHP callstack:
DWPlugin::show_widget_options [/display-widgets/display-widgets.php:283]
DWPlugin::show_hide_widget_options [/display-widgets/display-widgets.php:297]
Verification:
--
<input type="text" name="id_base" value='"><img src=x onerror=alert(1) />' />
<input type="submit" />
</form>
--
--
Regards,
Marcin Probola,