WordPress Domain Check 1.0.16 Reflected Cross-Site Scripting (XSS) Vulnerabilit
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | WordPress Domain Check <1.0.17 - Cross-Site Scripting | 8 Feb 202201:07 | – | nuclei |
![]() | Domain Check < 1.0.17 - Reflected Cross-Site Scripting | 28 Dec 202100:00 | – | wpexploit |
![]() | CVE-2021-24926 | 1 Feb 202213:15 | – | nvd |
![]() | WordPress Plugin Domain Check 1.0.16 - Reflected Cross-Site Scripting (XSS) (Authenticated) | 2 Feb 202200:00 | – | exploitdb |
![]() | WordPress Domain Check 1.0.16 Plugin - Reflected Cross-Site Scripting Vulnerability | 2 Feb 202200:00 | – | zdt |
![]() | CVE-2021-24926 Domain Check < 1.0.17 - Reflected Cross-Site Scripting | 1 Feb 202212:21 | – | cvelist |
![]() | WordPress Domain Check plugin cross-site scripting vulnerability | 10 Feb 202200:00 | – | cnvd |
![]() | WordPress Domain Check plugin <= 1.0.17 - Reflected Cross-Site Scripting (XSS) vulnerability | 28 Dec 202100:00 | – | patchstack |
![]() | Cross site scripting | 1 Feb 202213:15 | – | prion |
![]() | CVE-2021-24926 | 1 Feb 202213:15 | – | cve |
`# Exploit Title: WordPress Plugin Domain Check 1.0.16 - Reflected Cross-Site Scripting (XSS) (Authenticated)
# Date: 30-10-2021
# Exploit Author: Ceylan Bozogullarindan
# Author Webpage: https://bozogullarindan.com
# Vendor Homepage: https://domaincheckplugin.com/
# Software Link: https://wordpress.org/plugins/domain-check/
# Version: 1.0.16
# Tested on: Linux
# CVE: CVE-2021-24926 (https://wpscan.com/vulnerability/8cc7cbbd-f74f-4f30-9483-573641fea733)
# Description:
Domain Check is a Wordpress plugin that allows you to see what domains and SSL certificates are coming up for expiration and to quickly locate the coupons, coupon codes, and deals from your favorite sites before renewing.
An authenticated user is able to inject arbitrary Javascript or HTML code to the "Domain Check Profile" interface available in settings page of the plugin, due to incorrect sanitization of user-supplied data and achieve a Reflected Cross-Site Scripting attack against the administrators. The plugin versions prior to 1.0.16 are affected by this vulnerability.
The details of the discovery are given below.
# Steps To Reproduce:
1. Just visit the following page after signing in the administrator panel: http://vulnerable-wordpress-website/wp-admin/admin.php?page=domain-check-profile&domain=hacked.foo<script>alert(1)</script>
2. The XSS will be triggered on the settings page.
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo