mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
19 lines
1.1 KiB
Markdown
19 lines
1.1 KiB
Markdown
![]() |
### [CVE-2023-0520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0520)
|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
The RapidExpCart WordPress plugin through 1.0 does not sanitize and escape the url parameter in the rapidexpcart endpoint before storing it and outputting it back in the page, leading to a Stored Cross-Site Scripting vulnerability which could be used against high-privilege users such as admin, furthermore lack of csrf protection means an attacker can trick a logged in admin to perform the attack by submitting a hidden form.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|