Skip to content

Conversation

@syedazeez337
Copy link

/claim #14559

Summary

  • Adds detection for CVE-2016-15041: Unauthenticated Stored XSS in MainWP Dashboard plugin
  • Pure POC-based template without version-based detection (per bounty guidelines)
  • Exploits the mwp_setup_purchase_username parameter in the Quick Setup Wizard

Key Features

  • Multiple nonce extraction patterns (3 regex patterns)
  • Complete classification: CVSS 3.1 (6.1), CWE-79, EPSS 0.67231, CPE
  • Enhanced metadata: shodan-query, fofa-query, google-query
  • Unauthenticated attack vector

Attack Flow

  1. GET /wp-admin/admin-post.php?page=mainwp-setup&step=installation - Extract nonce
  2. POST payload to purchase_extension endpoint with nonce
  3. GET verify endpoint - Confirm payload is stored

Validation

  • Template validated: nuclei -validate -t CVE-2016-15041.yaml
  • Competitor's PR (Add Nuclei Template for CVE-2016-15041 #14560) uses version detection which violates bounty guidelines
  • This template follows guidelines: complete POC, no version dependency

References

- Complete POC-based template without version-based detection
- Multiple nonce extraction patterns for reliability
- Full classification (CVSS 3.1, CWE-79, EPSS 0.67231, CPE)
- Enhanced metadata (shodan, fofa, google queries)
- Unauthenticated stored XSS via mwp_setup_purchase_username parameter

Refs: projectdiscovery#14559
@pussycat0x
Copy link
Contributor

Hi @syedazeez337 we already received Pr this for #14560, Thank you for your interest.

@pussycat0x pussycat0x closed this Jan 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants