Exploits / Vulnerability Discovered : 2021-06-07 |
Type : webapps |
Platform : php
This exploit / vulnerability Wordpress plugin smart slider3 3.5.0.8 name stored crosssite scripting (xss) is for educational purposes only and if it is used you will do on your own risk!
1. Install WordPress 5.7.2
2. Install and activate the "*Smart Slider 3" Version 3.5.0.8* plugin
3. Navigate to "*Dashboard* and create a "*New Project*".
4. Enter the JavaScript payload "*<script>alert(document.cookie)</script>*" into the "*Name*" field.
5. You will observe that the Project has been created with malicious
JavaScript payload "<script>alert(document.cookie)</script>" and hence
project has been* created/stored* and thus JavaScript payload is executing
successfully.
*XSS IMPACT:*
1: Steal the cookie
2: User redirection to a malicious website
Wordpress plugin smart slider3 3.5.0.8 name stored crosssite scripting (xss)