README.md
Rendering markdown...
id: CVE-2023-37979
info:
name: Ninja Forms <= 3.6.25 - Reflected XSS (Authenticated)
author: Mehran Seifalinia
severity: medium
description: |
The Ninja Forms plugin for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) in versions up to, and including, 3.6.25. This vulnerability requires an authenticated user to exploit. Attackers can abuse the 'data' parameter with insufficient input sanitization and output escaping, allowing them to inject arbitrary web scripts that execute when an authenticated user, logged in to WordPress, performs certain actions, such as clicking on a link. Successful exploitation could lead to session hijacking, phishing attacks, or other malicious activities.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
cvss-score: 5.0
cve-id: CVE-2023-37979
metadata:
google-query: inurl:"/wp-content/plugins/ninja-forms/"
shodan-query: 'vuln:CVE-2023-37979'
tags: cve, wordpress, wp-plugin, ninja-forms, medium, xss
http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt"
- "{{BaseURL}}/wp-admin/admin.php?page=ninja-forms"
extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?m)Stable tag:\\s*([\\d.]+)"
- "Ninja Forms(?: Plugin)? Version:\\s*([\\d.]+)"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "Ninja Forms"
part: body
case-insensitive: true
- type: dsl
dsl:
- "compare_versions(version, '<= 3.6.25')"