CVE-2020-35589
Limit Login Attempts Reloaded <= 2.15.2 - Reflected Cross-Site Scripting
mediumImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
6.1
CVSS Score
6.1
CVSS Score
medium
Severity
2.17.4
Patched in
1135d
Time to patch
Description
The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NAttack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Low
Confidentiality
Low
Integrity
None
Availability
Technical Details
Affected versions
<=2.15.2PublishedDecember 14, 2020
Last updatedJanuary 22, 2024
Affected pluginlimit-login-attempts-reloaded
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.