Description
The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.
Published: 2020-12-21
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-23255 The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.
History

No history.

Subscriptions

Limitloginattempts Limit Login Attempts Reloaded
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T17:09:13.485Z

Reserved: 2020-12-21T00:00:00.000Z

Link: CVE-2020-35589

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-21T07:15:13.240

Modified: 2024-11-21T05:27:39.350

Link: CVE-2020-35589

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses