diff --git a/vulnerabilities/wordpress/15Zine-xss.yaml b/vulnerabilities/wordpress/15Zine-xss.yaml new file mode 100644 index 0000000000..c791d711b4 --- /dev/null +++ b/vulnerabilities/wordpress/15Zine-xss.yaml @@ -0,0 +1,31 @@ +id: 15Zine-xss + +info: + name: 15Zine < 3.3.0 - Reflected Cross-Site Scripting + author: veshraj + severity: medium + description: The theme does not sanitise and escape the cbi parameter before outputing it back in the response via the cb_s_a AJAX action, leading to a Reflected Cross-Site Scripting + reference: + - https://wpscan.com/vulnerability/d1dbc6d7-7488-40c2-bc38-0674ea5b3c95 + tags: xss,wordpress,wp-plugin,wp + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=cb_s_a&cbi=' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "" + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 \ No newline at end of file