header-logo
Suggest Exploit
vendor:
Duplicate Page
by:
Nikhil Kapoor
8,8
CVSS
HIGH
Stored Cross-Site Scripting (XSS)
79
CWE
Product Name: Duplicate Page
Affected Version From: 4.4.1
Affected Version To: 4.4.1
Patch Exists: Yes
Related CWE: N/A
CPE: 2.3:a:wordpress:duplicate_page:4.4.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2021

WordPress Plugin Duplicate Page 4.4.1 – Stored Cross-Site Scripting (XSS)

A stored XSS vulnerability was discovered in WordPress Plugin Duplicate Page 4.4.1. An attacker can exploit this vulnerability by installing and activating the Duplicate Page plugin, navigating to Settings >> Duplicate Page and entering an XSS payload into the Duplicate Post Suffix input field. When the payload is triggered, the JavaScript payload is executed successfully and a pop-up is displayed.

Mitigation:

Update to the latest version of the plugin.
Source

Exploit-DB raw data:

# Exploit Title: WordPress Plugin Duplicate Page 4.4.1 - Stored Cross-Site Scripting (XSS)
# Date: 02/09/2021
# Exploit Author: Nikhil Kapoor
# Software Link: https://wordpress.org/plugins/duplicate-page/
# Version: 4.4.1
# Category: Web Application
# Tested on Windows

How to Reproduce this Vulnerability:

1. Install WordPress 5.7.2
2. Install and activate Duplicate Page
3. Navigate to Settings >> Duplicate Page and enter the XSS payload into the Duplicate Post Suffix input field.
4. Click Save Changes.
5. You will observe that the payload successfully got stored into the database and when you are triggering the same functionality at that time JavaScript payload is executing successfully and we are getting a pop-up.
6. Payload Used: "><svg/onload=confirm(/XSS/)>