Security
Headlines
HeadlinesLatestCVEs

Headline

WordPress Login Rebuilder Cross Site Scripting

WordPress Login Rebuilder plugin versions prior to 2.8.1 suffer from a persistent cross site scripting vulnerability.

Packet Storm
#xss#vulnerability#wordpress#auth
Tittle:WordPress Plugin Login Rebuilder < 2.8.1 - Admin+ Stored XSSReferences:CVE-2023-2223Author:Taurus Omar Description:The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).Affects Plugins:Login Rebuilder - Fixed in version 2.8.1Proof of Concept:1. Go to Settings » Login rebuilder 2. In Login file keyword, add payload: "><iframe src="<svg onload=alert(4);>"> 3. Save the changes to trigger XSS. Classification:Type XSS OWASP top 10 A7: Cross-Site Scripting (XSS)CWE-79wpScan:https://wpscan.com/vulnerability/7b356b82-5d03-4f70-b4ce-f1405304bb52

Related news

CVE-2023-2223

The Login rebuilder WordPress plugin before 2.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution