id: CVE-2023-0552 info: name: WordPress Pie Register <3.8.2.3 - Open Redirect author: r3Y3r53 severity: medium description: | WordPress Pie Register plugin before 3.8.2.3 contains an open redirect vulnerability. The plugin does not properly validate the redirection URL when logging in and login out. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. remediation: | Fixed in version 3.8.2.3. reference: - https://wpscan.com/vulnerability/832c6155-a413-4641-849c-b98ba55e8551 - https://nvd.nist.gov/vuln/detail/CVE-2023-0552 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2023-0552 cwe-id: CWE-601 epss-score: 0.00092 epss-percentile: 0.37956 cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: genetechsolutions product: pie_register framework: wordpress tags: cve2023,cve,redirect,pie,pie-register,wpscan,genetechsolutions,wordpress http: - method: GET path: - "{{BaseURL}}/wp-admin?piereg_logout_url=true&redirect_to=https://oast.me" redirects: true matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)oast\.me.*$' # digest: 4a0a004730450221009a43102975ca9cbbf8f2d57a5f3a53496de4ac374bde3bcf0ee22cd7990f8c820220148b4d4d1ca0ef65545d30ac6b9ae93ed2bbf928f8b3e981e19fc44b2a19c151:922c64590222798bb761d5b6d8e72950