Description
WordPress 3dady real-time web stats plugin 1.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript by exploiting unsanitized input fields. Attackers can insert JavaScript payloads in the dady_input_text or dady2_input_text fields via the plugin options panel to execute arbitrary code when the page is viewed.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
UnD3sc0n0c1d0
References
www.exploit-db.com/exploits/51021 (ExploitDB-51021)
profiles.wordpress.org/3dady/ (Official Product Homepage)
www.vulncheck.com/...ss-3dady-real-time-web-stats-stored-xss (VulnCheck Advisory: WordPress 3dady Real-Time Web Stats 1.0 Stored XSS)