A Stored XSS Vulnerability was discovered in WordPress plugin, WP-UserOnline, by security researcher Steffin Stanly. With over 20,000 Active Installations, site administrators are urged to update to the latest available version ( 2.88.0 ) which addresses this vulnerability.
Exploit Author: Steffin Stanly
Vendor Homepage: https://github.com/lesterchan/wp-useronline
Software Link: https://wordpress.org/plugins/wp-useronline/
Version: <=2.87.6
Tested on Windows
How to reproduce vulnerability:
"><script>alert(1)</script>
On visiting the dashboard, You will observe that the payload successfully got stored in the database and when you are triggering the same functionality in that time JavaScript payload is executing successfully and we are getting a pop-up.
Suggest an edit to this article
Go to Cybersecurity Knowledge Base
Got to the Latest Cybersecurity News
Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.
Remember, CyberSecurity Starts With You!
This post was last modified on 31 July 2022 2:22 PM
British high street chain WH Smith has recently revealed that it was hit by a…
As banks worldwide roll out Voice ID as a means of user authentication over the…
In the era of digital transformation, cybersecurity has become a major concern for businesses. When…
In today's digital age, cybersecurity threats have become a significant concern for businesses of all…
The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…
One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…
Leave a Comment