Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

WordPress Members List <4.3.7 - Cross-Site Scripting

By kannthu

Medium
Vidoc logoVidoc Module
#wp#wordpress#wp-plugin#xss#wpscan
Description

What is the "WordPress Members List <4.3.7 - Cross-Site Scripting" module?

The "WordPress Members List <4.3.7 - Cross-Site Scripting" module is a test case designed to detect a specific vulnerability in the WordPress Members List plugin. This module focuses on identifying instances of cross-site scripting (XSS) vulnerabilities in versions of the plugin prior to 4.3.7. XSS vulnerabilities can allow attackers to inject malicious code into web pages viewed by users, potentially leading to unauthorized access or data theft.

This module has a severity level of medium, indicating that while it poses a potential risk, it may not have as severe consequences as high or critical severity vulnerabilities. The original author of this module is Akincibor.

Impact

If the "WordPress Members List" plugin is found to be vulnerable to cross-site scripting, it could allow attackers to execute arbitrary code within the context of the affected website. This can lead to various malicious activities, such as stealing sensitive user information, defacing the website, or spreading malware to site visitors.

How does the module work?

The "WordPress Members List <4.3.7 - Cross-Site Scripting" module works by sending a specific HTTP request to the targeted WordPress site. The request is designed to exploit the vulnerability by injecting a malicious payload into the "user.php" page of the plugin. The module then checks the response from the server to determine if the payload was successfully executed.

The module uses several matching conditions to identify if the vulnerability exists:

- The response body must contain the injected payload, which is "<img src onerror=alert(document.domain) x". - The response headers must indicate a content type of "text/html". - The HTTP status code of the response must be 200, indicating a successful request.

If all of these conditions are met, the module will report the vulnerability, indicating that the WordPress site is susceptible to cross-site scripting attacks.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/wp-content/plugins/...
Matching conditions
word: "><img src onerror=alert(document.domain...and
word: text/htmland
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability