3 results (0.003 seconds)

CVSS: 6.1EPSS: 0%CPEs: 3EXPL: 3

The SAML SSO Standard WordPress plugin version 16.0.0 before 16.0.8, SAML SSO Premium WordPress plugin version 12.0.0 before 12.1.0 and SAML SSO Premium Multisite WordPress plugin version 20.0.0 before 20.0.7 does not validate that the redirect parameter to its SSO login endpoint points to an internal site URL, making it vulnerable to an Open Redirect issue when the user is already logged in. The SSO Login Premium Multisite plugin for WordPress is vulnerable to Open Redirect in versions up to, and including, 20.0.7 due to missing validation of its redirect parameter. This makes it possible for an attacker to redirect authenticated users. This vulnerability also affects the Premium Edition (versions <12.1.0) and Standard Edition (versions <16.0.8) of the plugin. • https://wpscan.com/vulnerability/af2e30c7-0787-4fe2-97ee-bc616f7178a1 https://wpscan.com/vulnerability/be21f355-0e5b-4ad7-9d8f-85e9a0101ddc https://wpscan.com/vulnerability/e6c4c8c7-1dcd-45bf-8582-f12accca6fac • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

Utilities.php in the miniorange-saml-20-single-sign-on plugin before 4.8.84 for WordPress allows XSS via a crafted SAML XML Response to wp-login.php. This is related to the SAMLResponse and RelayState variables, and the Destination parameter of the samlp:Response XML element. El archivo Utilities.php en el plugin miniorange-saml-20-single-sign-on versiones anteriores a 4.8.84 para WordPress, permite un ataque de tipo XSS por medio de una Respuesta XML SAML diseñada en el archivo wp-login.php. Esto está relacionado con las variables SAMLResponse y RelayState y el parámetro Destination del elemento XML samlp:Response. • https://wordpress.org/plugins/miniorange-saml-20-single-sign-on/#developers https://zeroauth.ltd/blog https://zeroauth.ltd/blog/2020/01/28/cve-2020-6850-miniorange-saml-wp-plugin-before-4-8-84-is-vulnerable-to-xss-via-a-specially-crafted-saml-xml-response • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

In the miniOrange SAML SP Single Sign On plugin before 4.8.73 for WordPress, the SAML Login Endpoint is vulnerable to XSS via a specially crafted SAMLResponse XML post. En el plugin Single Sign On de miniOrange SAML SP anterior a versión 4.8.73 para WordPress, el Endpoint Login de SAML es vulnerable a ataques XSS por medio de una publicación XML SAMLResponse especialmente creada. • https://wpvulndb.com/vulnerabilities/9397 https://zeroauth.ltd/blog/2019/05/27/cve-2019-12346-miniorange-saml-sp-single-sign-on-wordpress-plugin-xss • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •