cve/2020/CVE-2020-35589.md

18 lines
977 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-35589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35589)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.
### POC
#### Reference
- https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/
#### Github
No PoCs found on GitHub currently.