Files
CVEs-PoC/2021/CVE-2021-25102.md
2025-09-29 21:09:30 +02:00

18 lines
1.0 KiB
Markdown

### [CVE-2021-25102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25102)
![](https://img.shields.io/static/v1?label=Product&message=All%20In%20One%20WP%20Security%20%26%20Firewall&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=4.4.11%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen)
### Description
The All In One WP Security & Firewall WordPress plugin before 4.4.11 does not validate, sanitise and escape the redirect_to parameter before using it to redirect user, either via a Location header, or meta url attribute, when the Rename Login Page is active, which could lead to an Arbitrary Redirect as well as Cross-Site Scripting issue. Exploitation of this issue requires the Login Page URL value to be known, which should be hard to guess, reducing the risk
### POC
#### Reference
- https://wpscan.com/vulnerability/9b8a00a6-622b-4309-bbbf-fe2c7fc9f8b6
#### Github
- https://github.com/20142995/nuclei-templates