id: CVE-2015-5461 info: name: WordPress StageShow <5.0.9 - Open Redirect author: 0x_Akoko severity: medium description: WordPress StageShow plugin before 5.0.9 contains an open redirect vulnerability in the Redirect function in stageshow_redirect.php. A remote attacker can redirect users to arbitrary web sites and conduct phishing attacks via a malicious URL in the url parameter. impact: | An attacker can trick users into visiting a malicious website, leading to potential phishing attacks. remediation: | Update to the latest version of the WordPress StageShow plugin (5.0.9 or higher) to fix the open redirect vulnerability. reference: - https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16 - https://wordpress.org/plugins/stageshow/changelog/ - http://seclists.org/fulldisclosure/2015/Jul/27 - https://nvd.nist.gov/vuln/detail/CVE-2015-5461 - https://plugins.trac.wordpress.org/changeset/1165310/ classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:N cvss-score: 6.4 cve-id: CVE-2015-5461 cwe-id: NVD-CWE-Other epss-score: 0.0055 epss-percentile: 0.77025 cpe: cpe:2.3:a:stageshow_project:stageshow:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: stageshow_project product: stageshow framework: wordpress google-query: inurl:"/wp-content/plugins/stageshow/" tags: cve2015,cve,wpscan,seclists,redirect,wordpress,wp-plugin,stageshow_project http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Finteract.sh" matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' # digest: 4a0a0047304502202859b878c456815dc2de4f34ef7ce4fbb5ce6868f17e145a47e5df1cf4a008df022100e1c8f735f6d9f14d8b5ba3d296c48f6b74d7152c59bc4eee04a4f4ee38ea61b7:922c64590222798bb761d5b6d8e72950