Miggo Logo

CVE-2020-13487:
bbPress stored Cross-Site Scripting (XSS) vulnerability in the Forum creation section

4.8

CVSS Score
3.1

Basic Information

EPSS Score
0.67879%
Published
5/24/2022
Updated
4/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
bbpress/bbpresscomposer<= 2.6.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper input sanitization in forum creation/editing combined with insufficient output escaping. Key points:

  1. The attack vector requires admin privileges in the post editor (wp-admin/post.php), implicating backend save handlers
  2. Stored XSS manifests in the admin list view (edit.php?post_type=forum), indicating rendering issues
  3. bbPress's custom forum metadata handling (likely in metabox save functions) would be the primary suspect for unsanitized input storage
  4. Admin list table implementations often require explicit escaping which might be missing in custom columns While exact code isn't available, the pattern matches common WordPress plugin XSS vulnerabilities where admin-side metabox handling fails to properly sanitize privileged user input before storage and display.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** **Pr*ss plu*in t*rou** *.*.* *or Wor*Pr*ss **s stor** XSS in t** *orum *r**tion s**tion, r*sultin* in J*v*S*ript *x**ution *t wp-**min/**it.p*p?post_typ*=*orum (*k* t** *orum listin* p***) *or *ll us*rs. *n **ministr*tor **n *xploit t*is *t t** w

Reasoning

T** vuln*r**ility st*ms *rom improp*r input s*nitiz*tion in *orum *r**tion/**itin* *om*in** wit* insu**i*i*nt output *s**pin*. K*y points: *. T** *tt**k v**tor r*quir*s **min privil***s in t** post **itor (wp-**min/post.p*p), impli**tin* ***k*n* s*v*