The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.
References
Link | Resource |
---|---|
https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/limit-login-attempts-reloaded/#developers | Product Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-12-21T06:03:41
Updated: 2020-12-21T06:03:41
Reserved: 2020-12-21T00:00:00
Link: CVE-2020-35589
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-12-21T07:15:13.240
Modified: 2020-12-22T19:53:04.990
Link: CVE-2020-35589
JSON object: View
Redhat Information
No data.
CWE