header-logo
Suggest Exploit
vendor:
Sell Downloads
by:
Mr Winst0n
7.5
CVSS
HIGH
Cross Site Scripting
79
CWE
Product Name: Sell Downloads
Affected Version From: 1.0.86
Affected Version To: 1.0.86
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:sell_downloads
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Parrot OS, Wordpress 5.1.1
2019

WordPress Plugin Sell Downloads 1.0.86 – Cross Site Scripting

A Cross-Site Scripting (XSS) vulnerability was discovered in the WordPress Plugin Sell Downloads 1.0.86. An attacker can inject malicious JavaScript code into the comment field of a product, which will be executed when the product page is viewed. This can be used to steal session cookies or perform other malicious actions.

Mitigation:

The vendor has released version 1.0.87 which fixes this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: WordPress Plugin Sell Downloads 1.0.86 - Cross Site Scripting
# Exploit Author: Mr Winst0n
# Author E-mail: manamtabeshekan@gmail.com
# Discovery Date: September 09,2019
# Vendor Homepage: https://wordpress.dwbooster.com/content-tools/sell-downloads
# Software Link : https://wordpress.org/plugins/sell-downloads/
# Tested Version: 1.0.86
# Tested on: Parrot OS, Wordpress 5.1.1


# PoC:
1- Go to "Products for Sale" section
2- Click on "Add New"
3- In opend window click on "Add Comment"
4- Fill comment as "/><img src=x onerror="alert()"> or "/><input type="text" onclick="alert()">
5- Click on "Publish" (or "Update" if you editing an existing product)
6- You will see a pop-up (also if click on input), Also if you go to product link will see the pop-up.