Share
## https://sploitus.com/exploit?id=PACKETSTORM:190297
# Exploit Title: Reservit Hotel < 3.0 - Admin+ Stored XSS
    # Date: 2024-10-01
    # Exploit Author: Ilteris Kaan Pehlivan
    # Vendor Homepage: https://wpscan.com/plugin/reservit-hotel/
    # Version: Reservit Hotel 2.1
    # Tested on: Windows, WordPress, Reservit Hotel < 3.0
    # CVE : CVE-2024-9458
    
    The plugin does not sanitise and escape some of its settings, which could
    allow high privilege users such as admin to perform Stored Cross-Site
    Scripting attacks even when the unfiltered_html capability is disallowed
    (for example in multisite setup).
    
    1. Install and activate Reservit Hotel plugin.
    2. Go to Reservit hotel > Content
    3. Add the following payload to the Button text > French field sane save: "
    style=animation-name:rotation onanimationstart=alert(/XSS/)//
    4. The XSS will trigger upon saving and when any user will access the
    content dashboard again
    
    References:
    https://wpscan.com/vulnerability/1157d6ae-af8b-4508-97e9-b9e86f612550/
    https://www.cve.org/CVERecord?id=CVE-2024-9458