header-logo
Suggest Exploit
vendor:
WP Lead Management
by:
Chris Kellum
7,5
CVSS
HIGH
Persistent XSS
79
CWE
Product Name: WP Lead Management
Affected Version From: 3.0.0
Affected Version To: 3.0.0
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:wp_lead_management
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2012

WP Lead Management v3.0.0 Persistent XSS

The form does not properly sanitize input fields, allowing for XSS. Example: <script>alert('xss')</script> XSS will fire when the admin views the lead management page if the javascript is included in the name, otherwise the javascript can be included in the 'requirements' field and will fire when an admin 'picks' the lead.

Mitigation:

Upgrade to version 3.0.1 or later.
Source

Exploit-DB raw data:

# Exploit Title: WP Lead Management v3.0.0 Persistent XSS
# Date: 8/5/12
# Exploit Author: Chris Kellum
# Software Link: http://downloads.wordpress.org/plugin/wp-effective-lead-management.3.0.1.zip
# Version: 3.0.0



=====================
Vulnerability Details
=====================

The form does not properly sanitize input fields, allowing for XSS.

     Example:

          <script>alert('xss')</script>

XSS will fire when the admin views the lead management page if the javascript is included in the name, otherwise the javascript can be included in the "requirements" field and will fire when an admin "picks" the lead.

===================
Disclosure Timeline
===================

8/4/12 - Vulnerability discovered. No author contact information available. Public disclosure.