vendor:
Simply Poll Plugin
by:
m3tamantra
8,8
CVSS
HIGH
Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS)
352, 79
CWE
Product Name: Simply Poll Plugin
Affected Version From: 1.4.1
Affected Version To: 1.4.1
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:simply_poll_plugin
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Apache/2.2.16 (Debian) PHP 5.3.3-7+squeeze14 with Suhosin-Patch (cli)
2013
WordPress Simply Poll Plugin 1.4.1 CSRF and stored XSS
The WordPress Simply Poll Plugin 1.4.1 is vulnerable to Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS). The question parameter is vulnerable to XSS and the plugin has an CSRF vulnerability (Polls=>Add New). The PoC leads to arbitrary javascript execution in back-end area. An attacker can exploit this vulnerability by sending a link (pointing to the PoC html file) to a logged in admin. When the admin views the Polls the javascript Code will execute.
Mitigation:
Update to the latest version of the plugin and ensure that all users are using strong passwords.