WordPress GiveWP 2.9.7 Cross-Site Scripting



Application Details

GiveWP is an online fundraising platform utilised to increase online donations, manage donors, and gain insight into the fundraising goals, all directly from within a WordPress website.


Vulnerability

GiveWP plugin WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the edit.php script.


Identification

A remote attacker could exploit this vulnerability using the 's' parameter in a specially crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

GET /wp-admin/edit.php?s="></script><script>alert('idappcomDEE')</script>&start-date&end-date&form_id=0&action=-1&paged=1&give_action=delete_bulk_donor&orderby=id&order=DESC&action2=-1&post_type=give_forms&page=give-donors&view=donors


Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to influence the vulnerable parameter with cross-site scripting attempts.


Coverage

Idappcom has created signature 8010953 along with a traffic file.


References

WordPress GiveWP 2.9.7 XSS - Packet Storm Security

CVE-2021-24213


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can share your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional