id: CVE-2023-0552 info: name: WordPress Pie Register <3.8.2.3 - Open Redirect author: r3Y3r53 severity: medium description: | WordPress Pie Register plugin before 3.8.2.3 contains an open redirect vulnerability. The plugin does not properly validate the redirection URL when logging in and login out. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. remediation: | Fixed in version 3.8.2.3. reference: - https://wpscan.com/vulnerability/832c6155-a413-4641-849c-b98ba55e8551 - https://nvd.nist.gov/vuln/detail/CVE-2023-0552 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2023-0552 cwe-id: CWE-601 epss-score: 0.00077 epss-percentile: 0.32235 cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: genetechsolutions product: pie_register framework: wordpress tags: cve2023,redirect,pie,pie-register,wpscan,cve http: - method: GET path: - "{{BaseURL}}/wp-admin?piereg_logout_url=true&redirect_to=https://oast.me" redirects: true matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)oast\.me.*$' # digest: 4a0a0047304502200b97acd2960e9b3d1088e56a09273e43be5b9d6e2123257dbf3bf7857626628e022100da4a845e6b1f50b57f5ddd2108f4871d8db3c91eed973378e332dc5430014ca8:922c64590222798bb761d5b6d8e72950