id: CVE-2015-5461 info: name: WordPress StageShow <5.0.9 - Open Redirect author: 0x_Akoko severity: medium description: WordPress StageShow plugin before 5.0.9 contains an open redirect vulnerability in the Redirect function in stageshow_redirect.php. A remote attacker can redirect users to arbitrary web sites and conduct phishing attacks via a malicious URL in the url parameter. remediation: | Update to the latest version of the WordPress StageShow plugin (5.0.9 or higher) to fix the open redirect vulnerability. reference: - https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16 - https://wordpress.org/plugins/stageshow/changelog/ - http://seclists.org/fulldisclosure/2015/Jul/27 - https://nvd.nist.gov/vuln/detail/CVE-2015-5461 - https://plugins.trac.wordpress.org/changeset/1165310/ classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:N cvss-score: 6.4 cve-id: CVE-2015-5461 cwe-id: NVD-CWE-Other epss-score: 0.0055 epss-percentile: 0.74848 cpe: cpe:2.3:a:stageshow_project:stageshow:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: stageshow_project product: stageshow framework: wordpress google-query: inurl:"/wp-content/plugins/stageshow/" tags: wpscan,seclists,redirect,cve,cve2015,wordpress,wp-plugin http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Finteract.sh" matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' # digest: 4a0a0047304502210086f8efbb1febb7215f1b98ed4f5efee319785862b5b23b79f69775c95030e05b02205646c88fe84c57de3e0194973993b8f07201c8344d832d77dcf0fc61c9781acd:922c64590222798bb761d5b6d8e72950