Lucene search

K
wpexploitVikas SrivastavaWPEX-ID:A3CD3115-2181-4E14-8B39-4DE096433847
HistoryJul 23, 2021 - 12:00 a.m.

Simple Post <= 1.1 - Authenticated Stored Cross-Site Scripting (XSS)

2021-07-2300:00:00
Vikas Srivastava
330
wordpress installation
simple post activation
settings configuration
xss payload
database storage
javascript execution
exploit

EPSS

0

Percentile

14.0%

The plugin does not sanitize user input when an authenticated user Text value, then it does not escape these values when outputting to the browser leading to an Authenticated Stored XSS Cross-Site Scripting issue.

1. Install WordPress 5.7.2
2. Install and activate Simple Post
3. Navigate to Settings >> Simple Post and enter the XSS payload into the Text input field.
4. Click Update Options.
5. You will observe that the payload successfully got stored into the database and when you are triggering the same functionality at that time JavaScript payload is executing successfully and we are getting a pop-up.
6. Payload Used: "><script>alert(document.cookie)</script>

EPSS

0

Percentile

14.0%

Related for WPEX-ID:A3CD3115-2181-4E14-8B39-4DE096433847