Cross-Site Scripting Vulnerability in WordPress Plugin || EmbedPress < 3.9.2

Raj Upadhyay
1 min readNov 19, 2023

Let’s see how to utilize Python script to detect whether website that is utilizing “EmbedPress” plugin which is vulnerable to Cross-Site Scripting.

Background

The EmbedPress — Embed PDF, YouTube, Google Docs, Vimeo, Wistia Videos, Audios, Maps & Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the hash parameter in all versions up to, and including, 3.9.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Affected versions:

EmbedPress <= 3.9.1

Installation:

  1. Clone the repo
git clone https://github.com/IRB0T/CVE-Scan.git

2. Navigate to the “EmbedPress-Scan” directory

cd EmbedPress-Scan

3. Install the dependencies with pip. Depending on your local python3 setup, the required commands will be either:

pip install -r requirements.txt
OR pip3 install -r requirements.txt

4. Open CMD and type below command, Where you need to replace your target by providing appropriate URL. (E.g. Python Embedpress_Vul_Check.py YOUR_URL)

Pyhton Embedpress_Vul_Check.py http://192.168.0.2

Reference:

1.https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/embedpress/draft-vulnerability-for-embedpress-392
2.https://wordpress.org/plugins/embedpress/#developers

--

--

Raj Upadhyay

Pursuing M. Tech. in Cyber Security and Incident Response. #LoveToPlayCTF #infosec #cybersecurity