Authenticated Persistent Cross-Site Scripting (XSS) Vulnerability in GreenShift
The changelog for the latest version of the WordPress plugin GreenShift reads “Added: Lighbox improvements and security improvements for social share block, typography options.” The security improvement referenced in that appears to refer to adding escaping when outputting user input from a block. Even in the code being modified the escaping is incomplete, which is confirmed with the proof of concept below. That means there is currently an authenticated persistent cross-site scripting (XSS) vulnerability in the plugin. Other similar code also doesn’t have need escaping. We have notified the developer of that and offered to help them address that.
...
This post provides insights on a vulnerability in the WordPress plugin Greenshift not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.
If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.
For existing customers, please log in to your account to view the rest of the contents of the post.