id: CVE-2023-0552 info: name: WordPress Pie Register <3.8.2.3 - Open Redirect author: r3Y3r53 severity: medium description: | WordPress Pie Register plugin before 3.8.2.3 contains an open redirect vulnerability. The plugin does not properly validate the redirection URL when logging in and login out. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. remediation: | Fixed in version 3.8.2.3. reference: - https://wpscan.com/vulnerability/832c6155-a413-4641-849c-b98ba55e8551 - https://nvd.nist.gov/vuln/detail/CVE-2023-0552 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2023-0552 cwe-id: CWE-601 epss-score: 0.00077 epss-percentile: 0.32386 cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: genetechsolutions product: pie_register framework: wordpress tags: cve2023,redirect,pie,pie-register,wpscan,cve http: - method: GET path: - "{{BaseURL}}/wp-admin?piereg_logout_url=true&redirect_to=https://oast.me" redirects: true matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)oast\.me.*$' # digest: 4a0a0047304502206d8973245af04cfc972532ec2aee76d48df3cbdc3bea4389dc2e698051e9f02d022100c03565a6c3e0fc958acb741d4ef248fab147c37d40770a5a10d736bb18ec7908:922c64590222798bb761d5b6d8e72950