Reflected XSS in wp-mail plugin

Credit

This vulnerability has been discovered and reported by Carl Clegg (carl(at)cjc(dot)im)

Timeline

Product

WP Mail plugin is simply a wp network mail or message system. User can send mail or messages to other users over one wp network.

Versions Affected

WP Mail <= 1.2

Risk / Severity Rating

Not calculated

Description and Impact

The replyto parameter when composing a mail allows for a reflected XSS.

$replyTo = isset($_GET['replyto']) ? $_GET['replyto'] : '';
...
<input type="text" class="form-control" placeholder="Enter receiver's wordpress email" name="reciever_mail" required="required" value="<?php echo !empty($replyTo) ? $replyTo : $to; ?>">

Proof of Concept

http://wordpress.site/wp-admin/admin.php?page=wp_mail_compose&replyto=%22%3E%3Cscript+src%3Ddata%3A%26comma%3Balert%281%29%2F%2F

would execute alert(1) but could be used to run something more malicious

Solution

Upgrade to version 1.2

References

Legal

The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.

home