Affected Plugin Version: <1.6.5
Vulnerability Name: Stored Cross-Site Scripting
Impact: Attackers possess the capability to execute scripts within a victim's browser, thereby seizing user sessions, defacing websites, injecting hostile content, redirecting users, and commandeering the user's browser through malicious software.
METHOD OF EXPLOITATION:
1. Initiate the installation of WordPress and navigate to the dashboard.
2. Proceed to the Plugins section and opt for Add New.
3. Proceed with the installation and activation of the Page Generator Plugin.
4. Access settings > Page Generator.
5. The "Terms" Input Field is susceptible to Stored XSS Vulnerability. Introduce XSS Payload and confirm changes by selecting the save button.
Payload example:
Code: Select all
</text><script>alert("XSS")>/script>
6. Upon execution, the payload will be successfully stored in the database. Subsequent visits to the page generator page will reveal the successful execution of the payload, manifesting as a pop-up notification.