Lucene search

K
wpexploitJuampa RodríguezWPEX-ID:E84B71F9-4208-4EFB-90E8-1C778E7D2EBB
HistoryJun 05, 2023 - 12:00 a.m.

Aajoda Testimonials < 2.2.2 - Admin+ Stored XSS

2023-06-0500:00:00
Juampa Rodríguez
45
aajoda
testimonials
stored xss

0.001 Low

EPSS

Percentile

41.3%

The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

1. In Aajoda » Optional Aajoda Style, insert the following payload: "></textarea><script>alert(/XSS/)</script>

2. Save the changes to get the XSS exploit.

0.001 Low

EPSS

Percentile

41.3%

Related for WPEX-ID:E84B71F9-4208-4EFB-90E8-1C778E7D2EBB