Lucene search

K
wpexploitMesut CetinWPEX-ID:479704D8-057B-4642-B84A-4A78567BA20B
HistoryNov 08, 2021 - 12:00 a.m.

Bookly < 20.3.1 - Staff Member Stored Cross-Site Scripting

2021-11-0800:00:00
Mesut Cetin
81
bookly software
staff member
stored cross-site scripting
profile edit
xss exploit
admin
order page

EPSS

0.001

Percentile

24.8%

The plugin does not escape the Staff Full Name field before outputting it back in a page, which could lead to a Stored Cross-Site Scripting issue

As a Staff Member, put the following payload in your Full Name (Booklyn --> Profile --> Edit --> Full Name): <script>alert(/XSS/)</script>

The XSS will be triggered when an admin open the Staff members order page (Booklyn --> Staff Members --> Staff member order)

EPSS

0.001

Percentile

24.8%

Related for WPEX-ID:479704D8-057B-4642-B84A-4A78567BA20B