Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting

By kannthu

Medium
Vidoc logoVidoc Module
#xss#wp#wordpress#wpml#wp-plugin
Description

What is the "WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting" module?

The "WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting" module is designed to detect a vulnerability in the WPML plugin for WordPress. WPML is a popular plugin used for multilingual websites. This module specifically targets versions of WPML that are older than 4.6.1. The severity of this vulnerability is classified as medium.

Impact

If exploited, this vulnerability allows an attacker to inject malicious scripts into the WPML plugin, potentially leading to unauthorized access, data theft, or other malicious activities. This can compromise the security and integrity of the affected WordPress website.

How the module works?

The module works by sending a GET request to the "/wp-login.php?wp_lang=en_US%27" path of the WordPress website. It then checks the response for specific conditions to determine if the vulnerability exists.

The matching conditions for this module are as follows:

- The response status code must be 200. - The response body must contain the words "#039;\"=" and "wpml_lang".

If both conditions are met, the module flags the vulnerability and triggers the specified action, which is to report the vulnerability.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/wp-login.php?wp_lan...
Matching conditions
status: 200and
word: #039;"=, wpml_lang
Passive global matcher
No matching conditions.
On match action
Report vulnerability