CVE-2020-35589
Summary
| CVE | CVE-2020-35589 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-21 07:15:00 UTC |
| Updated | 2020-12-22 19:53:00 UTC |
| Description | The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Limitloginattempts | Limit Login Attempts Reloaded | All | All | All | All |
| Application | Limitloginattempts | Limit Login Attempts Reloaded | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Limit Login Attempts Reloaded – Plugin Directory — WordPress | MISC | wordpress.org | Product, Third Party Advisory |
| WordPress Plugin Limit Login Attempts Reloaded - Multiple Vulnerabilities - The Tales of N4nj0 | MISC | n4nj0.github.io | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.