WP Relevanssi plugin XSS

In this exercise, the attacker has admin access already so there is nothing more to be done. However, looks like the admin access does lead to an XSS attack. So you can try to find this XSS as purely academic exercise.

WordPress is a free and open source full-featured CMS for hosting blogs and web portals. It is based on PHP and MySQL. It is one of the most popular CMS.

WordPress Relevanssi Plugin (4.0.4) is vulnerable to a Reflected Cross Site Scripting documented in CVE-2018-9034.

The following username and passwords may be used to explore the application and/or find a vulnerability which might require authenticated access:

| Username | Password | | admin | password1 |

Objective: Your task is to find and exploit this vulnerability.

CVE is a registered trademark of The MITRE Corporation.

Solutions:

The solution for this lab can be found in the following manual: https://assets.ine.com/labs/ad-manuals/walkthrough-1023.pdf

Last updated