Lucene search

K
wpexploitDmitrii IgnatyevWPEX-ID:E6D9FE28-DEF6-4F25-9967-A77F91899BFE
HistoryMar 25, 2024 - 12:00 a.m.

WP Customer Reviews < 3.7.1 - Malicious Redirect via HTTP-EQUIV Injection

2024-03-2500:00:00
Dmitrii Ignatyev
21
wordpress
customer reviews
security
vulnerability
malicious redirect
injection
http-equiv
exploit

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin does not validate a parameter allowing contributor and above users to redirect a page to a malicious URL

1) Create a new post
2) In the "Bussness Name" field enter the payload: `0;http://smth.me/" HTTP-EQUIV="refresh" a="a)`
3) Save the post and view it. You will see that you are redirected.

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for WPEX-ID:E6D9FE28-DEF6-4F25-9967-A77F91899BFE