cvelist/2023/1xxx/CVE-2023-1861.json

89 lines
3.0 KiB
JSON
Raw Normal View History

2023-04-05 08:00:34 +00:00
{
2023-05-02 08:00:37 +00:00
"data_version": "4.0",
2023-04-05 08:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-1861",
2023-05-02 08:00:37 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2023-04-05 08:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-05-02 08:00:37 +00:00
"value": "The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Limit Login Attempts",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "affected",
"versionType": "custom",
"version": "0",
"lessThanOrEqual": "1.7.2"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/461cbcca-aed7-4c92-ba35-ebabf4fcd810",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/461cbcca-aed7-4c92-ba35-ebabf4fcd810"
2023-04-05 08:00:34 +00:00
}
]
2023-05-02 08:00:37 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Marc Montpas"
},
{
"lang": "en",
"value": "WPScan"
}
]
2023-04-05 08:00:34 +00:00
}