Not Really a WordPress Plugin Vulnerability, Week of July 16
In reviewing reports of vulnerabilities in WordPress plugins to provide our customers with the best data on vulnerabilities in plugins they use we often find that there are reports for things that don’t appear to be vulnerabilities. For more problematic reports we release posts detailing why the vulnerability reports are false, but there have been a lot of that we haven’t felt rose to that level. In particular, are items that are not outright false, just the issue is probably more accurately described as a bug. For those that don’t rise to level of getting their own post we now place them in a weekly post when we come across them.
Stored Cross-Site Scripting (XSS) in WPFront Notification Bar
A claimed stored cross-site scripting (XSS) vulnerability in the plugin WPFront Notification Bar has the same issue that many recent false reports have had, the attacker would need to be logged in to WordPress as an Administrator.
Here the attacker would have to have access to the plugin’s settings page:
Navigate to *WPFront Notification Bar *>> Setting >> notification bar and
fill the required data and enter the below-mentioned payload into the Custom
CSS user input field.
To access that page, you need to have the manage_option capability, which only Administrators have:
161 | $page_hook_suffix = add_options_page(__('WPFront Notification Bar', 'wpfront-notification-bar'), __('Notification Bar', 'wpfront-notification-bar'), 'manage_options', self::PLUGIN_SLUG, array($this, 'options_page')); |
Administrators can do whatever they want (since they are Administrators), including removing security code from plugins, so it wouldn’t be a vulnerability to do what is mentioned in the report.