SeQure: Cross-Site Scripting Vulnerability Tool for WordPress Form Plugins
Persistent URL
Author(s)
Caldwell, Alexis
Date Issued
May 5, 2023
Abstract
XSS vulnerabilities, despite being one of the older web exploits, continue to plague modern web applications. This odes to programmers not properly screening inputs to programs – in this case, web forms. The content manager system, WordPress, for example operates roughly 43% of web applications across the Internet. Within WordPress, it has distinct plugins to handle contact form information which includes the ability to take in information such as a name, a phone number, email address, etc. However, not all versions of these plugins are deemed safe. There are many versions of WordPress form plugins that allow attackers to enter in cross-site scripting, or otherwise known as XSS, scripts into these input forms making the attacker able to provide malicious information, downloads, and/or plugins to the user. To avoid XSS attacks within form plugins on WordPress, the plugin SeQure allows website users to be able to check their form plugins to make sure that they are safe for further use.
Major
Computer Science
First Reader(s)
Luman, Douglas J.
Other Reader(s)
Bonham-Carter, Oliver N.
Department
Computer Science
Type of Publication
Senior Project Paper
File(s)![Thumbnail Image]()
Name
SeniorThesis.pdf
Size
676.41 KB
Format
Adobe PDF
Checksum (MD5)
adb311dd13417d7052ae89d7649b2666