HTTP: WordPress Limit Login Attempts Plugin Stored Cross Site Scripting

This signature detects attempts to exploit a known cross-site scripting vulnerability against WordPress Limit Login. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks.

Extended Description

The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks

Affected Products

Limit_login_attempts_project limit_login_attempts

Short Name
HTTP:XSS:WORDPRESS-LOGIN-PLUG
Severity
Minor
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Attempts CVE-2023-1861 Cross Limit Login Plugin Scripting Site Stored WordPress
Release Date
09/11/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3632
False Positive
Unknown
Vendors

Limit_login_attempts_project

Found a potential security threat?