Wordpress (Easy Hide Login) plugin Stored XSS

2025.12.28
Credit: Mr.Falcon
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

## Description DOM-based Cross-Site Scripting vulnerability in [Easy Hide Login] WordPress plugin allows authenticated administrators to inject arbitrary JavaScript code via improperly sanitized href attribute in plugin settings. ## Vulnerability Details - Type: DOM-based Cross-Site Scripting (Self) - Privilege Required: Administrator - Attack Vector: Local - CVSS Score: 3.1 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N ## Proof of Concept ### Steps to Reproduce: 1. Login to WordPress as Administrator 2. Navigate to the plugin settings page 3. Locate the input field with ID `login_slug` 4. Inject the following payload: "><script>alert("xss"); or <h1>html injection</h1> **Vulnerable Code Structure:** ```html <a id="login_url" href="http://localhost?">http://localhost?</a> <input type="text" id="login_slug" name="slug">

References:

https://wordpress.org/plugins/easy-hide-login/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2025, cxsecurity.com

 

Back to Top