Lucene search

K
packetstormCeylan BozogullarindanPACKETSTORM:165734
HistoryJan 27, 2022 - 12:00 a.m.

WordPress Mortgage Calculators WP 1.52 Cross Site Scripting

2022-01-2700:00:00
Ceylan Bozogullarindan
packetstormsecurity.com
192
wordpress
mortgage calculators
cross site scripting
authenticated
stored
cve-2021-24904
xss
calculator
admin panel
javascript
payload
shortcode

EPSS

0.001

Percentile

38.3%

`# Exploit Title: WordPress Plugin Mortgage Calculators WP 1.52 - Stored Cross-Site Scripting (XSS) (Authenticated)  
# Date: 25-10-2021  
# Exploit Author: Ceylan Bozogullarindan  
# Vendor Homepage: https://lenderd.com/  
# Software Link: https://mortgagecalculatorsplugin.com/  
# Version: 1.52  
# Tested on: Linux  
# CVE : CVE-2021-24904 (https://wpscan.com/vulnerability/7b80f89b-e724-41c5-aa03-21d1eef50f21)  
  
  
# Description:  
The plugin gives users real-time estimates by providing mortgage calculators. It does not implement any sanitisation on the color value of the background of a calculator in admin panel, which could lead to authenticated Stored Cross-Site Scripting issues. An attacker can execute malicious javascript codes for all visitors of a page containing the calculator.  
  
  
# Steps To Reproduce:  
1. Go to settings page available under the "Calculator" menu item.  
2. Click the "Select Color" button and type the following payload the input space: `hacked</style></head><script>alert(1)</script>`  
3. Click the "Save Changes" button to save settings.  
4. Create a new page and add the shortcode ([mcwp type="cv"]) of the calculator, for testing.  
5. Visit the page to trigger XSS.  
  
`

EPSS

0.001

Percentile

38.3%