Share
## https://sploitus.com/exploit?id=PACKETSTORM:173725
Tittle:  
WordPress Plugin Seo By 10Web < 2.8.1 - Admin+ Stored XSS  
  
  
References:  
CVE-2023-2224  
  
Author:  
Taurus Omar   
  
Description:  
The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).  
  
Affects Plugins:  
Seo By 10Web - Fixed in version 1.2.7  
  
Proof of Concept:  
  
1. Go to SEO by 10Web ยป Sitemap section.  
  
2. And new URL to the page.  
  
3. Add XSS payload: "><audio src=x onerror=confirm("XSS")>  
  
4. Save to trigger the XSS.   
  
  
Classification:  
Type XSS   
OWASP top 10 A7: Cross-Site Scripting (XSS)  
CWE-79  
  
wpScan:  
https://wpscan.com/vulnerability/a76b6d22-1e00-428a-8a04-12162bd0d992