ListingPro - WordPress Directory Theme v2.0.14.2 Reflected & Persistent XSS -

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1840282 漏洞类型
发布时间 2019-11-29 更新时间 2019-11-29
漏洞平台 N/A CVSS评分 N/A
# Exploit Title: ListingPro - WordPress Directory Theme v2.0.14.2 Reflected & Persistent XSS
# Google Dork: /wp-content/themes/listingpro/
# Date: 29/11/2019
# Exploit Author: SUBVΞRSΛ
# Vendor Homepage:
# Software Link:
# Version: [ 12.563 Sales ]
# Tested on: Parrot OS
# CVE : -
# CWE : 79

----[]- Reflected XSS: -[]----
Use your payload inside the «What» input field on the homepage ( ) and then submit the form — payload will be triggered.

Payload Sample #0: <!--<img src="--><img src=x onerror=(alert)(document.cookie)//">
Payload Sample #1: "><img src=x onerror=alert(`SUBVΞRSΛ`)>

PoC Link:

----[]- Persistent XSS: -[]----
You need a new basic user account (register your own or use mine: kadajik5554913/hYWeOJdr5Mqe), then go to the page for new listing submit. Choose the «Free» plan and press «Continue» button. On the next page you need to choose any category and after that you'll see the vulnerable input fields: «Best Day/Night» and «Good For» (for some categories you'll see only one vulnerable input field — «Good For»). Use your payload inside vulnerable input field(-s) and save your listing.

Payload Sample #0: "><img src=x onerror=alert(document.cookie)>
Payload Sample #1: "><img src=x onerror=window.location.replace(``)>

PoC: log in as kadajik5554913/hYWeOJdr5Mqe (login/password) and go to the page.