Viewing 12 replies - 1 through 12 (of 12 total)
  • Good question I have jst had the same notification from Wordfence!! any news?

    Same notification in Wordfence and in hosting providers’ own security systems (Ionos, Godaddy…).

    Plugin Author nK

    (@nko)

    Hi everyone,

    I’m not sure why this XSS vulnerability was published. Back in January, Darius from Patchstack contacted me with XSS details, and I tried to reproduce it locally. I found that there is no issue with our plugin and informed Darius about this. I never received any reply or additional information from Darius or anyone else regarding the XSS issue.

    This was my reply:

    I may be missing something, but your example appears invalid.

    In your video, you’re breaking the block output, and our block code doesn’t execute at all. Instead, you’re displaying custom HTML. This approach allows outputting any content using any block name.

    From 2:24 in your video, the output is no longer from our block – it’s just a simple string:

    — There was a screenshot from the video, but I’m not sure it makes sense right now. —

    I can replicate this behavior in the editor with various tags, but this doesn’t indicate a vulnerability in our block. You can see an example of how our block should function and how your “injection” disrupts it here: https://shot.nkdev.info/94YjltmsRdp11RrsMP7Z. This example also demonstrates how renaming the block produces the same output.

    If I’m wrong, please show me where.

    I’ve contacted Darius again and am waiting for his reply. Perhaps someone else can help resolve this issue. I’m still unsure whether this report is valid since I cannot reproduce it. If it is valid, we will definitely fix it.

    Regards,
    Nikita.

    Plugin Author nK

    (@nko)

    Darius replied to me and rejected this security report as it appears invalid 👍

    cantbutron

    (@cantbutron)

    WPScan continues to report a security issue with the plugin due to the possibility of content injection.
    https://wpscan.com/plugin/advanced-backgrounds/

    Has there been any update on this? Wordfence link is broken. WPScan CVE-ID was rejected. I have a free account with Wordfence so news is always delayed 30 days.

    Hozefa Saleh

    (@hozefasmile)

    Hi, The wpscan also showing this vulnarability (content injection) https://wpscan.com/plugin/advanced-backgrounds/

    Wordfence still flags it as vulnerable, with a broken link.

    Plugin Author nK

    (@nko)

    @dportela WPScan ignores our emails, so we’re not sure how to fix this since the issue was never on our side.

    Thanks. I posted to the Wordfence support forum about it, but the post was held for moderation. Hopefully it will be published and that will prompt an update.

    The Wordfence support thread has been posted and answered. And my latest scan just now, with the plugin enabled, came through clean. Success (at least with Wordfence)!

    I’ve sent a message to WPScan through the contact form on their site, as they no longer support non-enterprise customers through the WordPress.org support forums. I installed their plugin to run a check and it’s still flagging the false positive. Hopefully they will see the message and make an update.

    • This reply was modified 3 months, 3 weeks ago by dportela. Reason: Adding WPScan scan and contact
    Plugin Author nK

    (@nko)

    @dportela thank you 🎉 We contacted WPScan twice but received no response.

Viewing 12 replies - 1 through 12 (of 12 total)

You must be logged in to reply to this topic.