Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "WordPress Members List <4.3.7 - Cross-Site Scripting" module is a test case designed to detect a specific vulnerability in the WordPress Members List plugin. This module focuses on identifying instances of cross-site scripting (XSS) vulnerabilities in versions of the plugin prior to 4.3.7. XSS vulnerabilities can allow attackers to inject malicious code into web pages viewed by users, potentially leading to unauthorized access or data theft.
This module has a severity level of medium, indicating that while it poses a potential risk, it may not have as severe consequences as high or critical severity vulnerabilities. The original author of this module is Akincibor.
If the "WordPress Members List" plugin is found to be vulnerable to cross-site scripting, it could allow attackers to execute arbitrary code within the context of the affected website. This can lead to various malicious activities, such as stealing sensitive user information, defacing the website, or spreading malware to site visitors.
The "WordPress Members List <4.3.7 - Cross-Site Scripting" module works by sending a specific HTTP request to the targeted WordPress site. The request is designed to exploit the vulnerability by injecting a malicious payload into the "user.php" page of the plugin. The module then checks the response from the server to determine if the payload was successfully executed.
The module uses several matching conditions to identify if the vulnerability exists:
- The response body must contain the injected payload, which is "<img src onerror=alert(document.domain) x
".
- The response headers must indicate a content type of "text/html".
- The HTTP status code of the response must be 200, indicating a successful request.
If all of these conditions are met, the module will report the vulnerability, indicating that the WordPress site is susceptible to cross-site scripting attacks.