Lucene search

K
wpvulndbDmitrii IgnatyevWPVDB-ID:E6D9FE28-DEF6-4F25-9967-A77F91899BFE
HistoryMar 25, 2024 - 12:00 a.m.

WP Customer Reviews < 3.7.1 - Malicious Redirect via HTTP-EQUIV Injection

2024-03-2500:00:00
Dmitrii Ignatyev
wpscan.com
3
wordpress
customer reviews
vulnerability
malicious redirect
injection
security flaw

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin does not validate a parameter allowing contributor and above users to redirect a page to a malicious URL

PoC

  1. Create a new post 2) In the “Bussness Name” field enter the payload: 0;http://smth.me/" HTTP-EQUIV="refresh" a="a) 3) Save the post and view it. You will see that you are redirected.
CPENameOperatorVersion
eq3.7.1

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for WPVDB-ID:E6D9FE28-DEF6-4F25-9967-A77F91899BFE