The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks.# CVE-2023-6000 PoC
## How does this detection method work?
This template looks at the following path: /wp-content/plugins/popup-builder/readme.txt
Based on the Stable Tag listed, if the version is prior to `4.2.3` then it is considered to be vulnerable.
## How do I run this script?
1. Download Nuclei from [here](https://github.com/projectdiscovery/nuclei)
2. Copy the template to your local system
3. Run the following command: `nuclei -u https://yourHost.com -t template.yaml`
## References
- https://nvd.nist.gov/vuln/detail/CVE-2023-6000
- https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-flaw-to-infect-3-300-sites-with-malware/
## Disclaimer
Use at your own risk, I will not be responsible for illegal activities you conduct on infrastructure you do not own or have permission to scan.
[4.0K] /data/pocs/df36d90918eb942eec4bb5598f74cd4dc8b0ec4d
├── [1.0K] CVE-2023-6000.yaml
└── [ 838] README.md
0 directories, 2 files