cve/2023/CVE-2023-1861.md

18 lines
795 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-1861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1861)
![](https://img.shields.io/static/v1?label=Product&message=Limit%20Login%20Attempts&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/461cbcca-aed7-4c92-ba35-ebabf4fcd810
#### Github
No PoCs found on GitHub currently.