Step 1: Payload Creation: An attacker, with contributor-level privileges, crafts a malicious link with a crafted title attribute containing JavaScript code (e.g., <a href="#" title="<img src=x onerror=alert(document.cookie)>">).
Step 2: Payload Insertion: The attacker inserts the malicious link into a WordPress post or page using the Colorbox plugin's functionality.
Step 3: Administrator Interaction: An administrator views the post or page containing the malicious link. The Colorbox plugin renders the link and its title attribute.
Step 4: XSS Execution: When the administrator interacts with the link (e.g., by clicking it or hovering over it, depending on the plugin's configuration), the malicious JavaScript within the title attribute is executed in the administrator's browser context.
Step 5: Impact: The executed JavaScript can perform various malicious actions, such as stealing the administrator's session cookies, redirecting the administrator to a phishing site, or defacing the website.