Vulnerability Details: Authenticated Persistent Cross-Site Scripting (XSS) in Smart Forms
Recently we detailed an attempt to fix a reflected cross-site scripting (XSS) vulnerability in the plugin Smart Forms after noticing the changelog entry for the version that occurred in was “Security fix.”, it turns out there were other vulnerabilities that were actually fixed in that version, though confusingly the discoverer of one of them states that it was fixed in a different version and they missed the full scope of what they noticed. Earlier today the JPCERT/CC released a report crediting Masaki Saito of TDU Cryptography Lab for discovery of a cross-site request forgery (CSRF) vulnerability in the plugin. The report states that “Smart Forms 2.6.15 and earlier” were impacted. When went to check over things though we found that there were no changes in the subsequent version, 2.6.16, that would have fixed that type of issue despite the suggested solution being “Update the plugin”.
...
This post provides insights on a vulnerability in the WordPress plugin Smart Forms not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.
If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.
For existing customers, please log in to your account to view the rest of the contents of the post.