CVE-2018-5361:
WPGlobus plugin Stored XSS & CSRF security vulnerability
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.65711%
CWE
Published
5/13/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
wpglobus/wpglobus | composer | <= 1.9.6 | 1.9.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues in options handling: 1) Missing CSRF protection through wp_nonce verification in the options saving routine, allowing forged requests. 2) Inadequate sanitization of multiple wpglobus_option parameters (enabled_languages, more_languages, etc.) when storing them, enabling XSS payload injection. The combination of these flaws in the options persistence mechanism makes the __save_options method (or equivalent options handler) the primary vulnerable function. While exact function names aren't explicitly disclosed, WordPress plugin patterns and the vulnerability's nature strongly indicate the options handling method in the admin class as the vulnerable component.