{"api_version":"1","generated_at":"2026-04-23T05:57:40+00:00","cve":"CVE-2020-35589","urls":{"html":"https://cve.report/CVE-2020-35589","api":"https://cve.report/api/cve/CVE-2020-35589.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-35589","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-35589"},"summary":{"title":"CVE-2020-35589","description":"The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-12-21 07:15:00","updated_at":"2020-12-22 19:53:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://wordpress.org/plugins/limit-login-attempts-reloaded/#developers","name":"https://wordpress.org/plugins/limit-login-attempts-reloaded/#developers","refsource":"MISC","tags":["Product","Third Party Advisory"],"title":"Limit Login Attempts Reloaded – Plugin Directory — WordPress","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/","name":"https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"WordPress Plugin Limit Login Attempts Reloaded - Multiple Vulnerabilities - The Tales of N4nj0","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-35589","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35589","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"35589","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"limitloginattempts","cpe5":"limit_login_attempts_reloaded","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"35589","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"limitloginattempts","cpe5":"limit_login_attempts_reloaded","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-35589","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/","refsource":"MISC","name":"https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/"},{"url":"https://wordpress.org/plugins/limit-login-attempts-reloaded/#developers","refsource":"MISC","name":"https://wordpress.org/plugins/limit-login-attempts-reloaded/#developers"}]}},"nvd":{"publishedDate":"2020-12-21 07:15:00","lastModifiedDate":"2020-12-22 19:53:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.17.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"35589","Ordinal":"195194","Title":"CVE-2020-35589","CVE":"CVE-2020-35589","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"35589","Ordinal":"1","NoteData":"The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"35589","Ordinal":"2","NoteData":"2020-12-21","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"35589","Ordinal":"3","NoteData":"2020-12-21","Type":"Other","Title":"Modified"}]}}}