6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
54.9%
High-Tech Bridge Security Research Lab discovered vulnerability in Paid Memberships Pro WordPress plugin, which can be exploited to perform Cross-Site Scripting (XSS) attacks against website administrators.
1.1 Input passed via “s” HTTP GET parameter to “/wp-admin/admin.php” (when “page” is set to “pmpro-membershiplevels”) is not properly sanitised before being returned to the user. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
The exploitation example below uses the “alert()” JavaScript function to display “ImmuniWeb” word:
http://[host]/wp-admin/admin.php?page=pmpro-membershiplevels&s=%22%3E%3Cscri pt%3Ealert%28%27ImmuniWeb%27%29;%3C/script%3E
1.2 Input passed via “edit” HTTP GET parameter to “/wp-admin/admin.php” (when “page” is set to “pmpro-membershiplevels”) is not properly sanitised before being returned to the user. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
The exploitation example below uses the “alert()” JavaScript function to display “ImmuniWeb” word:
http://[host]/wp-admin/admin.php?page=pmpro-membershiplevels&edit=%22%3E%3Cs cript%3Ealert%28%27ImmuniWeb%27%29;%3C/script%3E
1.3 Input passed via “s” HTTP GET parameter to “/wp-admin/admin.php” (when “page” is set to “pmpro-memberslist”) is not properly sanitised before being returned to the user. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
The exploitation example below uses the “alert()” JavaScript function to display “ImmuniWeb” word:
http://[host]/wp-admin/admin.php?l&page=pmpro-memberslist&s=%22%3E%3Cscript% 3Ealert%28%27ImmuniWeb%27%29;%3C/script%3E
1.4 Input passed via “s” HTTP GET parameter to “/wp-admin/admin.php” (when “page” is set to “pmpro-orders”) is not properly sanitised before being returned to the user. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
The exploitation example below uses the “alert()” JavaScript function to display “ImmuniWeb” word:
http://[host]/wp-admin/admin.php?filter=all&start-month=1&start-day=1&start- year=2015&end-month=6&end-day=22&end-year=2015&predefined-date=This+Month&l= 1&status&page=pmpro-orders&s=%22%3E%3Cscript%3Ealert%28%27immuniweb%27%29;%3 C/script%3E
CPE | Name | Operator | Version |
---|---|---|---|
paid memberships pro wordpress plugin | le | 1.8.4.2 |
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
54.9%