# Exploit Title: WordPress Plugin Buddypress 6.2.0 - Persistent Cross-Site Scripting # Exploit Author: Vulnerability-Lab # Date: 2020-11-13 # Vendor Homepage: https://wordpress.org/plugins/buddypress/ # Version: 6.2.0 Document Title: =============== Buddypress v6.2.0 WP Plugin - Persistent Web Vulnerability References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=2263 Release Date: ============= 2020-11-13 Vulnerability Laboratory ID (VL-ID): ==================================== 2263 Common Vulnerability Scoring System: ==================================== 4.2 Vulnerability Class: ==================== Cross Site Scripting - Persistent Current Estimated Price: ======================== 500€ - 1.000€ Product & Service Introduction: =============================== Are you looking for modern, robust, and sophisticated social network software? BuddyPress is a suite of components that are common to a typical social network, and allows for great add-on features through WordPress’s extensive plugin system. Aimed at site builders & developers, BuddyPress is focused on ease of integration, ease of use, and extensibility. It is deliberately powerful yet unbelievably simple social network software, built by contributors to WordPress. (Copy of the Homepage: https://wordpress.org/plugins/buddypress/ & https://buddypress.org/download/ ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered a persistent xss web vulnerability in the Buddypress v6.2.0 plugin for wordpress. Affected Product(s): ==================== Buddypress Product: Buddypress v6.0.0 - v6.2.0 (Wordpress Plugin) Vulnerability Disclosure Timeline: ================================== 2020-11-13: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== Medium Authentication Type: ==================== Restricted Authentication (Moderator Privileges) User Interaction: ================= No User Interaction Disclosure Type: ================ Independent Security Research Technical Details & Description: ================================ A persistent input validation web vulnerability has been discovered in the Buddypress v6.0.0 - v6.2.0 plugin for wordpress. The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise browser to web-application requests from the application-side. The persistent vulnerability is located in the `wp:html` name parameter of the `figure` content. Remote attackers with privileges are able to inject own malicious persistent script code as input to compromise the internal ui of the wordpress backend. The attacker injects his code and in case the admin or other privileged user account previews the content the code simple executes. The request method to inject is POST and the attack vector is located on the application-side. Successful exploitation of the vulnerabilities results in session hijacking, persistent phishing attacks, persistent external redirects to malicious source and persistent manipulation of affected application modules. Request Method(s): [+] POST Vulnerable Module(s): [+] wp:html Vulnerable Parameter(s): [+] figure Affected Module(s): [+] page_id=x&preview=true Proof of Concept (PoC): ======================= The persistent web vulnerability can be exploited by remote attackers with privilged user accounts without user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. PoC: Inject https://test23.localhost:8000/wp-admin/post.php?post=6&action=edit PoC: Execute https://test23.localhost:8000/?page_id=6 https://test23.localhost:8000/?page_id=6&preview=true PoC: Vulnerable Source