.. / CVE-2021-25075

Exploit for WordPress Duplicate Page or Post <1.5.1 - Cross-Site Scripting (CVE-2021-25075)

Description:

WordPress Duplicate Page or Post plugin before 1.5.1 contains a stored cross-site scripting vulnerability. The plugin does not have any authorization and has a flawed cross-site request forgery check in the wpdevart_duplicate_post_parametrs_save_in_db AJAX action, allowing unauthenticated users to call it and change the plugin’s settings, or perform such attack via cross-site request forgery.

Nuclei Template

View the template here CVE-2021-25075.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-25075.yaml
Copy

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25075
https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b
https://github.com/ARPSyndicate/kenzer-templates
https://github.com/kazet/wpgarlic
https://nvd.nist.gov/vuln/detail/CVE-2021-25075