Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-35693 PoC — WordPress plugin 12 Step Meeting List 跨站脚本漏洞

Source
Associated Vulnerability
Title:WordPress plugin 12 Step Meeting List 跨站脚本漏洞 (CVE-2024-35693)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin 12 Step Meeting List 3.14.33 版本及之前版本存在跨站脚本漏洞,该漏洞源于网页生成过程中输入中和不当。
Description
Code for Recovery 12 Step Meeting List versions up to 3.14.33 contain a reflected cross-site scripting caused by improper input neutralization during web page generation, letting attackers execute malicious scripts in users' browsers, exploit requires attacker to craft a malicious URL.
File Snapshot

id: CVE-2024-35693 info: name: WordPress 12 Step Meeting List Plugin <= 3.14.33 - Cross-Site Scri ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.