CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Lifecycle Timeline
2DescriptionNVD
The Valuation Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AnalysisAI
Stored Cross-Site Scripting in the Valuation Calculator WordPress plugin (all versions up to 1.3.2) allows authenticated attackers with Contributor-level access or higher to inject arbitrary JavaScript through the 'link' parameter due to insufficient input sanitization and output escaping. Injected scripts execute in the context of any user viewing the affected page, potentially compromising site visitors and enabling session hijacking, credential theft, or malware distribution. No public exploit code or active exploitation has been confirmed at time of analysis.
Technical ContextAI
The vulnerability is rooted in CWE-79 (Improper Neutralization of Input During Web Page Generation), a stored XSS flaw in the commercial-real-estate-valuation-calculator WordPress plugin. The plugin fails to sanitize user input from the 'link' parameter before storing it in the database and fails to properly escape output when rendering the parameter in page content. This allows attackers to bypass WordPress's input validation mechanisms. WordPress authentication (Contributor role or above) is enforced by the plugin architecture, but the vulnerability itself exists in the plugin's custom request handling rather than WordPress core. The Wordfence source indicates the flaw is in the valuation-calculator.php file around line 386, where the link parameter is processed without adequate sanitization routines such as sanitize_url() or proper escaping via esc_url_raw() on input, and esc_attr() or esc_url() on output.
Affected ProductsAI
The Valuation Calculator plugin for WordPress, formally titled commercial-real-estate-valuation-calculator (CPE inferred: cpe:2a:wordpress:*:commercial-real-estate-valuation-calculator), is affected in all versions up to and including 1.3.2. The plugin is distributed through the official WordPress Plugin Directory at https://wordpress.org/plugins/commercial-real-estate-valuation-calculator/. The vulnerable code is tracked in the WordPress plugins repository at https://plugins.trac.wordpress.org/browser/commercial-real-estate-valuation-calculator/trunk/valuation-calculator.php#L386. Wordfence has assigned the vulnerability identifier eb14f2ed-6ae8-409e-86fc-c305a56f5d5b and provides additional details at https://www.wordfence.com/threat-intel/vulnerabilities/id/eb14f2ed-6ae8-409e-86fc-c305a56f5d5b.
RemediationAI
Site administrators should immediately update the Valuation Calculator plugin to the latest available version, which has addressed the sanitization and escaping deficiencies. As of the changeset referenced (https://plugins.trac.wordpress.org/changeset/3336105/), a patched version has been released in the official WordPress Plugin Directory. Users unable to update immediately should restrict Contributor-level access to trusted administrators only, audit existing pages for injected content, and monitor user access logs for unauthorized modifications. For detailed patching information and developer notes, consult https://wordpress.org/plugins/commercial-real-estate-valuation-calculator/#developers and the Wordfence vulnerability advisory at https://www.wordfence.com/threat-intel/vulnerabilities/id/eb14f2ed-6ae8-409e-86fc-c305a56f5d5b.
Share
External POC / Exploit Code
Leaving vuln.today