12 Jan

Vulnerability Details: Persistent Cross-Site Scripting (XSS) Vulnerability in Chained Quiz

This post provides the details of a vulnerability in the WordPress plugin Chained Quiz not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so its contents are limited to subscribers of our service. If you are not currently a subscriber, you can try out the service for free and then you can view the contents of the post. There are a lot of other reason that you will want to sign up beyond access to posts like this one, including that you would have already been warned about this vulnerability if your website was vulnerable due to it.

For existing customers, please log in to your account to view the post.

2 thoughts on “Vulnerability Details: Persistent Cross-Site Scripting (XSS) Vulnerability in Chained Quiz

  1. “Any available cookies will be shown in alert box on that page.”

    This is simply not true. The HTML is shown as HTML on the page because it is escaped. The plugin MUST allow all kind of input from users because it can be used to examine HTML knowledge.

    • Prior to what you are quoting we noted the vulnerability was fixed by escaping the output. The proof of concept you are quoting shows how the vulnerability would be exploited in prior versions, before the escaping was done, so that seems to be what is confusing you about this.

Leave a Reply

Your email address will not be published. Required fields are marked *