The Stock in & out WordPress plugin through 1.0.4 has a search functionality, the lowest accessible level to it being contributor. The srch POST parameter is not validated, sanitised or escaped before using it in the echo statement, leading to a reflected XSS issue
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/c25146fd-4143-463c-8c85-05dd33e9a77b | third party advisory exploit |
https://codevigilant.com/disclosure/2021/wp-plugin-stock-in/ | third party advisory exploit |