The editor of the WP Page Builder WordPress plugin before 1.2.4 allows lower-privileged users to insert unfiltered HTML, including JavaScript, into pages via the “Raw HTMLâ€� widget and the “Custom HTMLâ€� widgets (though the custom HTML widget requires sending a crafted request – it appears that this widget uses some form of client side validation but not server side validation), all of which are added via the “page_builder_dataâ€� parameter when performing the “wppb_page_saveâ€� AJAX action. It is also possible to insert malicious JavaScript via the “wppb_page_cssâ€� parameter (this can be done by closing out the style tag and opening a script tag) when performing the “wppb_page_saveâ€� AJAX action.

Source: CVE-2021-24208

댓글 남기기

이메일은 공개되지 않습니다. 필수 입력창은 * 로 표시되어 있습니다

Time limit is exhausted. Please reload the CAPTCHA.