Lucene search

K
wpvulndbMarc MontpasWPVDB-ID:7A5FADB1-3F1C-4779-8FF6-356FCCB5269B
HistoryMar 26, 2021 - 12:00 a.m.

Patreon WordPress < 1.7.2 - Reflected XSS on Login Form

2021-03-2600:00:00
Marc Montpas
wpscan.com
12
patreon
wordpress
xss
cross-site scripting
login form
vulnerability
plugin
takeover.

EPSS

0.002

Percentile

58.9%

The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the plugin. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized. To successfully exploit this vulnerability, an attacker needs to trick his victim into visiting a booby-trapped link containing malicious Javascript code. Since Javascript runs in the victim’s browser context, an attacker can adjust the code hidden in that link to do whatever this user’s privileges allow him to. If this attack succeeds against an administrator, the script can completely take over the site.

EPSS

0.002

Percentile

58.9%

Related for WPVDB-ID:7A5FADB1-3F1C-4779-8FF6-356FCCB5269B