Lucene search

K
wpexploitDipak Panchal (th3.d1pak)WPEX-ID:0A0ECDFF-C961-4947-BF7E-BD2392501E33
HistoryJul 17, 2023 - 12:00 a.m.

Bubble Menu < 3.0.5 - Admin+ Stored XSS

2023-07-1700:00:00
Dipak Panchal (th3.d1pak)
73
admin
stored xss
javascript payload
bubble menu
exploit

EPSS

0.001

Percentile

23.8%

Description The plugin does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).

1. Click on the "Add new" tab.

2. Select the "Menu" tab.

3. Enter the javascript payload in the "Link" field: javascript:alert(/XSS/);

4. Save it, visit the site, and click on the bubble menu.

EPSS

0.001

Percentile

23.8%

Related for WPEX-ID:0A0ECDFF-C961-4947-BF7E-BD2392501E33