Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
WEBIGniter v28.7.23 XSS - exploit.company
header-logo
Suggest Exploit
vendor:
WEBIGniter
by:
RedTeamer IT Security, Mesut Cetin
4.1
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: WEBIGniter
Affected Version From: v28.7.23
Affected Version To: v28.7.23
Patch Exists: NO
Related CWE:
CPE: a:webigniter:webigniter:28.7.23
Metasploit:
Other Scripts:
Platforms Tested:
2023

WEBIGniter v28.7.23 XSS

The 'your_name' parameter in WEBIGniter v28.7.23 lacks proper input validation, leading to a vulnerability where an attacker can execute malicious JavaScript code by injecting it into the parameter. This can result in reflected cross-site scripting (XSS) attacks, potentially compromising user data and system integrity.

Mitigation:

To mitigate this vulnerability, it is crucial to implement thorough input validation and encoding for the 'your_name' parameter. This ensures that any user input is properly sanitized to prevent the execution of malicious code.
Source

Exploit-DB raw data:

## Title: WEBIGniter v28.7.23 XSS
## Author: RedTeamer IT Security, Mesut Cetin
## Date: 09/04/2023
## Vendor: https://webigniter.net/
## Software: https://webigniter.net/demo
## Reference: https://portswigger.net/web-security/cross-site-scripting/stored

## Description:
During the user creation process, the 'your_name' parameter fails to adequately validate user input, rendering the system vulnerable to reflected cross-site scripting (XSS) attacks.

## PoC
To exploit this vulnerability, an attacker can inject malicious JavaScript code into the "your_name" parameter under https://webigniter.net/create-account during the user creation process. This code, when embedded within an image tag like this: <img src onerror="prompt(8)">, can be executed when the user navigates to the "users" page under their profile.

## Mitigation
To mitigate this risk, the "your_name" parameter should be subjected to rigorous input validation and encoding to ensure that all user input is sanitized and rendered harmless.