## https://sploitus.com/exploit?id=PACKETSTORM:173725
Tittle:
WordPress Plugin Seo By 10Web < 2.8.1 - Admin+ Stored XSS
References:
CVE-2023-2224
Author:
Taurus Omar
Description:
The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Affects Plugins:
Seo By 10Web - Fixed in version 1.2.7
Proof of Concept:
1. Go to SEO by 10Web ยป Sitemap section.
2. And new URL to the page.
3. Add XSS payload: "><audio src=x onerror=confirm("XSS")>
4. Save to trigger the XSS.
Classification:
Type XSS
OWASP top 10 A7: Cross-Site Scripting (XSS)
CWE-79
wpScan:
https://wpscan.com/vulnerability/a76b6d22-1e00-428a-8a04-12162bd0d992