The Login Configurator WordPress plugin through 2.1 does not properly escape a URL parameter before outputting it to the page, leading to a reflected cross-site scripting vulnerability targeting site administrators.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/173723/WordPress-Login-Configurator-2.1-Cross-Site-Scripting.html | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/173723/WordPress-Login-Configurator-2.1-Cross-Site-Scripting.html | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-07-17 14:15
Updated : 2024-11-21 07:40
NVD link : CVE-2023-1893
Mitre link : CVE-2023-1893
CVE.ORG link : CVE-2023-1893
JSON object : View
Products Affected
login_configurator_project
- login_configurator
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')