Exploits / Vulnerability Discovered : 2021-05-24 |
Type : webapps |
Platform : php
This exploit / vulnerability Wordpress plugin redi restaurant reservation 21.0307 comment stored crosssite scripting (xss) is for educational purposes only and if it is used you will do on your own risk!
1. Go to the page where [redirestaurant] is embed to make a restaurant reservation by filling in the requested information
2. In the 'Comment' field of the restaurant reservation form put the payload: `<script>alert("XSS")</script>`
3. Submit the form
4. While being logged into WordPress as administrator go to ReDi Reservations > Upcoming (Tablet PC)
5. Click on 'View upcoming reservations'
6. Select for 'Show reservations for': 'This week'
7. The reservations are loaded and two alerts are shown with text 'XSS'